Sciweavers

1186 search results - page 93 / 238
» Goal-Oriented Interaction Protocols
Sort
View
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 4 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
FC
2000
Springer
106views Cryptology» more  FC 2000»
14 years 1 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
MASCOTS
2001
13 years 11 months ago
Improving Ensemble-TCP Performance on Asymmetric Networks
For the World Wide Web, the Transmission Control Protocol (TCP) and the HyperText Transfer Protocol (HTTP) are two important protocols. However, interactions between these two pro...
Qian Wu, Carey L. Williamson
GC
2004
Springer
14 years 1 months ago
The SOCS Computational Logic Approach to the Specification and Verification of Agent Societies
This article summarises part of the work done during the first two years of the SOCS project, with respect to the task of modelling interaction amongst CL-based agents. It describe...
Marco Alberti, Federico Chesani, Marco Gavanelli, ...
WSCG
2001
161views more  WSCG 2001»
13 years 11 months ago
An Animation System for User interface Agents
With the advent of software agents and assistants, the concept of so called conversational user interfaces evolved, incorporating natural language interaction, dialogue management...
Marc Alexa, Uwe Berner, Michael Hellenschmidt, Tho...