Sciweavers

592 search results - page 59 / 119
» Competition, Cooperation, and Authorization
Sort
View
CHI
2010
ACM
13 years 11 months ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
ISCAPDCS
2004
13 years 9 months ago
Building Collaborative Environments for Advanced Computing
Abstract. Synchronous collaborative systems allow geographically distributed participants to form a virtual work environment enabling cooperation between peers and enriching the hu...
Gareth J. Lewis, S. Mehmood Hasan, Vassil N. Alexa...
ATAL
2009
Springer
13 years 8 months ago
Directed Deadline Obligations in Agent-Based Business Contracts
There are B2B relationships that presume cooperation in contract enactment. This issue should be taken into account when modeling, for computational handling, contractual commitmen...
Henrique Lopes Cardoso, Eugénio C. Oliveira
CCR
2008
94views more  CCR 2008»
13 years 7 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...
TKDE
2010
272views more  TKDE 2010»
13 years 6 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta