Sciweavers

187 search results - page 30 / 38
» Intensional Programming for Agent Communication
Sort
View
ICALP
2009
Springer
14 years 7 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
CDC
2008
IEEE
132views Control Systems» more  CDC 2008»
14 years 1 months ago
A distributed auction algorithm for the assignment problem
— The assignment problem constitutes one of the fundamental problems in the context of linear programming. Besides its theoretical significance, its frequent appearance in the a...
Michael M. Zavlanos, Leonid Spesivtsev, George J. ...
CORR
2010
Springer
205views Education» more  CORR 2010»
13 years 7 months ago
Behavioral Simulations in MapReduce
In many scientific domains, researchers are turning to large-scale behavioral simulations to better understand real-world phenomena. While there has been a great deal of work on s...
Guozhang Wang, Marcos Antonio Vaz Salles, Benjamin...
DKE
2008
114views more  DKE 2008»
13 years 7 months ago
Proof explanation for a nonmonotonic Semantic Web rules language
In this work, we present the design and implementation of a system for proof explanation in the Semantic Web, based on defeasible reasoning. Trust is a vital feature for Semantic ...
Grigoris Antoniou, Antonis Bikakis, Nikos Dimaresi...
WOA
2003
13 years 8 months ago
An approach to the integration of peer-to-peer systems with active environments
— We adopt a form of group communication, called channeled multicast, for active rooms and other scenarios featuring strict real-time requirements, inherently unreliable communic...
Paolo Busetta, Mattia Merzi