Sciweavers

138 search results - page 20 / 28
» Communication decisions in multi-agent cooperation: model an...
Sort
View
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 1 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
EDOC
1997
IEEE
13 years 11 months ago
Tele-Education Process Modelling Supported by The ODP Enterprise Viewpoint Language
This paper reports on applying the ODP enterprise viewpoint in the domain of tele-education. The work is conducted as part of a research activity1 that aims at designing a tele-ed...
Cees Volman, Val Jones, Marten van Sinderen, Ing W...
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
EUROCAST
2007
Springer
159views Hardware» more  EUROCAST 2007»
13 years 11 months ago
Ant Colony Optimization for Model Checking
Abstract Model Checking is a well-known and fully automatic technique for checking software properties, usually given as temporal logic formulas on the program variables. Most of m...
Enrique Alba, J. Francisco Chicano
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
13 years 11 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...