Sciweavers

1516 search results - page 277 / 304
» How Open is e-Science
Sort
View
SACMAT
2003
ACM
14 years 21 hour ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SIGIR
2003
ACM
14 years 19 hour ago
eBizSearch: a niche search engine for e-business
Niche Search Engines offer an efficient alternative to traditional search engines when the results returned by general-purpose search engines do not provide a sufficient degree of...
C. Lee Giles, Yves Petinot, Pradeep B. Teregowda, ...
VRML
2003
ACM
14 years 18 hour ago
A multi-user virtual environment system with extensible animations
Multi-user virtual environment (MUVE) systems integrate the technologies of virtual reality and distributed system to allow users to interact with each other in a realistic virtua...
Yi-Lin Liu, Tsai-Yen Li
ATAL
2003
Springer
14 years 9 hour ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 4 hour ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor