Sciweavers

7504 search results - page 1447 / 1501
» Computing with Action Potentials
Sort
View
SIGSOFT
2003
ACM
14 years 3 months ago
Modeling and validation of service-oriented architectures: application vs. style
Most applications developed today rely on a given middleware platform which governs the interaction between components, the access to resources, etc. To decide, which platform is ...
Luciano Baresi, Reiko Heckel, Sebastian Thöne...
WPES
2003
ACM
14 years 3 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ATAL
2003
Springer
14 years 3 months ago
Searching social networks
A referral system is a multiagent system whose member agents are capable of giving and following referrals. The specific cases of interest arise where each agent has a user. The ...
Bin Yu, Munindar P. Singh
CCS
2003
ACM
14 years 3 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
DIGRA
2003
Springer
14 years 3 months ago
Space, Agency, Meaning and Drama in Navigable Real-Time Virtual Environments
Does our preoccupation with navigable space distract us from the expressive potential of interactive media? Can our understanding of spatial context in virtual environments (VEs) ...
Stanislav Roudavski, François Penz
« Prev « First page 1447 / 1501 Last » Next »