Sciweavers

3999 search results - page 707 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
15 years 11 days ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
120
Voted
ESORICS
2010
Springer
15 years 2 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
IMC
2006
ACM
15 years 8 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
145
Voted
WMASH
2003
ACM
15 years 7 months ago
MobileNAT: a new technique for mobility across heterogeneous address spaces
We propose a new network layer mobility architecture called MOBILENAT to efficiently support micro and macro-mobility in and across heterogeneous address spaces common in emergin...
Milind M. Buddhikot, Adiseshu Hari, Kundan Singh, ...
KI
2006
Springer
15 years 2 months ago
Agent Logics as Program Logics: Grounding KARO
Abstract. Several options are available to relate agent logics to computational agent systems. Among others, one can try to find useful executable fragments of an agent logic or us...
Koen V. Hindriks, John-Jules Ch. Meyer