Sciweavers

495 search results - page 35 / 99
» Information theory of wideband communications
Sort
View
CCS
2005
ACM
14 years 1 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
TCOM
2008
136views more  TCOM 2008»
13 years 7 months ago
Cross-layer adaptive transmission with incomplete system state information
We consider a point-to-point communication system in which data packets randomly arrive to a finite-length buffer and are subsequently transmitted to a receiver over a timevarying ...
Anh Tuan Hoang, Mehul Motani
SAC
2004
ACM
14 years 1 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose
CIKM
1997
Springer
13 years 12 months ago
Analysis and Design of Server Informative WWW-Sites
The access patterns of the users of a web-site are traditionally analyzed in order to facilitate the user access to the site's information. In this study, however, a systemat...
Amir M. Zarkesh, Jafar Adibi, Cyrus Shahabi, Reza ...
BERTINORO
2005
Springer
14 years 1 months ago
Self-Aware Software - Will It Become a Reality?
The possibility of building self-aware software fascinated computer scientist since the beginning of computer science. Research in AI, and in particular on software agents, agent s...
Péter András, Bruce G Charlton