Sciweavers

178 search results - page 31 / 36
» Dependability Arguments with Trusted Bases
Sort
View
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
14 years 20 days ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
ACSAC
2001
IEEE
13 years 11 months ago
Privacy-Preserving Cooperative Statistical Analysis
The growth of the Internet opens up tremendous opportunities for cooperative computation, where the answer depends on the private inputs of separate entities. Sometimes these comp...
Wenliang Du, Mikhail J. Atallah
SIAMSC
2011
162views more  SIAMSC 2011»
13 years 2 months ago
Accelerating the LSTRS Algorithm
In a recent paper [Rojas, Santos, Sorensen: ACM ToMS 34 (2008), Article 11] an efficient method for solving the Large-Scale Trust-Region Subproblem was suggested which is based on ...
Jörg Lampe, Marielba Rojas, Danny C. Sorensen...
CDC
2009
IEEE
155views Control Systems» more  CDC 2009»
13 years 11 months ago
Efficient and robust communication topologies for distributed decision making in networked systems
Distributed decision making in networked systems depends critically on the timely availability of critical fresh information. Performance of networked systems, from the perspective...
John S. Baras, Pedram Hovareshti
ATAL
2007
Springer
13 years 11 months ago
Determining confidence when integrating contributions from multiple agents
Integrating contributions received from other agents is an essential activity in multi-agent systems (MASs). Not only must related contributions be integrated together, but the co...
Raphen Becker, Daniel D. Corkill