Sciweavers

1959 search results - page 181 / 392
» Concerned About Separation
Sort
View
SAINT
2003
IEEE
15 years 10 months ago
Implementing Role-based Interactions for Internet Agents
Large-scale distributed environments, such as the Internet, achieve advantages in exploiting software agents for applications, thanks to their autonomy in carrying out tasks. In s...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
SRDS
2003
IEEE
15 years 10 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
SSDBM
2003
IEEE
105views Database» more  SSDBM 2003»
15 years 10 months ago
Development of an Informatics Tool for Crystallography Laboratory Administrators
With increased demand for storage of scientific data comes a corresponding demand for efficient retrieval mechanisms necessary for analytical and reporting purposes. As is often...
Leah Sandvoss, Dennis P. Groth
MSWIM
2003
ACM
15 years 10 months ago
Flooding strategy for target discovery in wireless networks
In this paper, we address a fundamental problem concerning the best flooding strategy to minimize cost and latency for target discovery in wireless networks. Should we flood the ...
Zhao Cheng, Wendi Beth Heinzelman
SAC
2003
ACM
15 years 10 months ago
Enabling Mobile Agents to Dynamically Assume Roles
Agent-based application development must face the issues related to the interactions among agents. In fact, their sociality allows decomposing large applications into collaboratin...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi