Sciweavers

2261 search results - page 363 / 453
» Dynamic types for authentication
Sort
View
CONCUR
2008
Springer
13 years 10 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
CONEXT
2008
ACM
13 years 10 months ago
On cooperative settlement between content, transit and eyeball internet service providers
Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of the ISPs leads to selfish behaviors that result i...
Richard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, V...
REST
2010
ACM
13 years 10 months ago
A formal definition of RESTful semantic web services
In this article a formal model applying REST architectural principles to the description of semantic web services is introduced, including the discussion of its syntax and operati...
Antonio Garrote Hernández, María N. ...
EKAW
2008
Springer
13 years 10 months ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...
ENTER
2008
Springer
13 years 10 months ago
Adaptive Recommender Systems for Travel Planning
Conversational recommender systems have been introduced in Travel and Tourism applications in order to support interactive dialogues which assist users in acquiring their goals, e...
Tariq Mahmood, Francesco Ricci, Adriano Venturini,...