Sciweavers

592 search results - page 101 / 119
» Competition, Cooperation, and Authorization
Sort
View
SIGCOMM
2004
ACM
14 years 29 days ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ER
1999
Springer
196views Database» more  ER 1999»
13 years 11 months ago
A Process-Integrated Conceptual Design Environment for Chemical Engineering
Abstract. The process industries (chemicals, food, oil, ...) are characterized by - continuous or batch -- processes of material transformation. The design of such processes, and t...
Matthias Jarke, Thomas List, Klaus Weidenhaupt
ELPUB
2007
ACM
13 years 11 months ago
Managing Expectations for Open Access in Greece: Perceptions from the Publishers and Academic Libraries
In Greece, there seems to be a growing level of awareness regarding open access among scholars, faculty staff and information professionals. Indeed, consensus regarding the necess...
G. Christina Banou, A. Petros Kostagiolas
ECAI
2006
Springer
13 years 11 months ago
Agents with Anticipatory Behaviors: To Be Cautious in a Risky Environment
This work presents some anticipatory mechanisms in an agent architecture, modeling affective behaviours as effects of surprise. Through experiment discussion, the advantages of bec...
Cristiano Castelfranchi, Rino Falcone, Michele Piu...