Sciweavers

2940 search results - page 459 / 588
» Behavioral Constraints for Services
Sort
View
BTLAB
1997
Springer
14 years 1 months ago
A Real-Life Experiment in Creating an Agent Marketplace
Software agents help people with time consuming activities. One increasingly popular application for software agents is electronic commerce, namely having agents buy and sell good...
Anthony Chavez, Daniel Dreilinger, Robert H. Guttm...
CNSR
2007
IEEE
181views Communications» more  CNSR 2007»
14 years 1 months ago
The Application of Users' Collective Experience for Crafting Suitable Search Engine Query Recommendations
Search engines have turned into one of the most important services of the Web that are frequently visited by any user. They assist their users in finding appropriate information. ...
Faezeh Ensan, Ebrahim Bagheri, Mohsen Kahani
CSFW
2009
IEEE
14 years 1 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
GIS
2009
ACM
14 years 1 months ago
Towards modeling the traffic data on road networks
A spatiotemporal network is a spatial network (e.g., road network) along with the corresponding time-dependent weight (e.g., travel time) for each edge of the network. The design ...
Ugur Demiryurek, Bei Pan, Farnoush Banaei Kashani,...
GLOBECOM
2009
IEEE
14 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer