Sciweavers

1540 search results - page 242 / 308
» Deceptive agents and language
Sort
View
CD
2004
Springer
14 years 1 months ago
Asynchronous, Hierarchical, and Scalable Deployment of Component-Based Applications
The deployment of distributed component-based applications is a complex task. Proposed solutions are often centralized, which excludes their use for the deployment of large-scale a...
Vivien Quéma, Roland Balter, Luc Bellissard...
SETN
2004
Springer
14 years 1 months ago
Data Brokers: Building Collections through Automated Negotiation
Collecting digital materials is time-consuming and can gain from automation. Since each source—and even each acquisition—may involve a separate negotiation of terms, a collecto...
Fillia Makedon, Song Ye, Sheng Zhang, James Ford, ...
POPL
2000
ACM
14 years 11 days ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ECOOP
2000
Springer
14 years 10 days ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews
TOOLS
1998
IEEE
14 years 8 days ago
An Architecture for Unified Dialogue in Distributed Object Systems
In traditional information systems, the user interface is controlled by one single application. In distributed systems, several distributed components may want to influence the ap...
Arve Larsen, Peter D. Holmes