Sciweavers

973 search results - page 102 / 195
» Arguing Using Opponent Models
Sort
View
IANDC
2008
115views more  IANDC 2008»
13 years 7 months ago
Fair multi-party contract signing using private contract signatures
A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a pre-agreed...
Aybek Mukhamedov, Mark Dermot Ryan
ISCI
2008
108views more  ISCI 2008»
13 years 7 months ago
Modeling and manipulating the structure of hierarchical schemas for the web
The Semantic Web is the next step of the current Web where information will become more machine-understandable to support effective data discovery and integration. Hierarchical sc...
Theodore Dalamagas, Alexandra Meliou, Timos K. Sel...
SP
2009
IEEE
14 years 2 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
WMCSA
2000
IEEE
14 years 4 days ago
Optimising thin clients for wireless active-media applications
The thin client model is uniquely suited for lowbandwidth mobile environments, where resource-poor devices may need to access critical applications over wireless networks. In this...
Cumbur Aksoy, Abdelsalam Helal
HOTOS
1999
IEEE
14 years 2 days ago
An Economic Approach to Adaptive Resource Management
Resource management is a fundamental concept in operating system design. In recent years it has become fashionable to consider the problem as an aspect of heterogeneous support fo...
Neil Stratford, Richard Mortier