Sciweavers

446 search results - page 19 / 90
» An approach to safe object sharing
Sort
View
CORR
2004
Springer
151views Education» more  CORR 2004»
13 years 7 months ago
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occ...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
ICMAS
1998
13 years 9 months ago
A New Approach to Class Formation in Multi-Agent Simulations of Language Evolution
Multi-agent models of language evolution usually involve agents giving names to internal independently constructed categories. We present an approach in which the creation of cate...
Frédéric Kaplan
SECPERU
2006
IEEE
14 years 1 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
CCS
2009
ACM
14 years 8 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
WWW
2008
ACM
14 years 8 months ago
Organizing and sharing distributed personal web-service data
The migration from desktop applications to Web-based services is scattering personal data across a myriad of Web sites, such as Google, Flickr, YouTube, and Amazon S3. This disper...
Roxana Geambasu, Cherie Cheung, Alexander Moshchuk...