Sciweavers

1395 search results - page 188 / 279
» Communication Security in Multi-agent Systems
Sort
View
ISN
1998
Springer
14 years 2 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
ITEE
2007
13 years 11 months ago
Distributed Power Generation: Requirements and Recommendations for an ICT Architecture
: Contemporary power distribution faces various new challenges. Most of those challenges have a strong impact on the ICT-structure required and on system architecture. This contrib...
Ludger Winkels, Jan-Patrick Osterloh, Fabian Gr&uu...
OSDI
2008
ACM
14 years 10 months ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
CCS
2009
ACM
13 years 7 months ago
RFID privacy: relation between two notions, minimal condition, and efficient construction
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of t...
Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li