Sciweavers

4305 search results - page 79 / 861
» Analysing Protocol Implementations
Sort
View
WWW
2007
ACM
14 years 9 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
ARGMAS
2007
Springer
14 years 27 days ago
On the Benefits of Exploiting Hierarchical Goals in Bilateral Automated Negotiation
Interest-based negotiation (IBN) is a form of negotiation in which agents exchange information about their underlying goals, with a view to improving the likelihood and quality of ...
Iyad Rahwan, Philippe Pasquier, Liz Sonenberg, Fra...
KBS
2002
88views more  KBS 2002»
13 years 8 months ago
Detecting mismatches among experts' ontologies acquired through knowledge elicitation
: We have constructed a set of ontologies modelled on conceptual structures elicited from several domain experts. Protocols were collected from various experts who advise on the se...
Adil Hameed, Derek H. Sleeman, Alun D. Preece
MASCOTS
2008
13 years 10 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
OOPSLA
2007
Springer
14 years 3 months ago
The JastAdd extensible Java compiler
We have implemented intraprocedural control-flow and data-flow analysis of Java source code in a declarative manner, using reference attribute grammars augmented with circular a...
Torbjörn Ekman, Görel Hedin