Sciweavers

1180 search results - page 103 / 236
» Interaction Protocols in Agentis
Sort
View
COMCOM
2010
148views more  COMCOM 2010»
15 years 1 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
IEEESCC
2006
IEEE
15 years 10 months ago
Secure and Provable Service Support for Human-Intensive Real-Estate Processes
This paper introduces SOAR, a service-oriented architecture for the real-estate industry that embeds trust and security, allows for formal correctness proofs of service interactio...
Emerson Ribeiro de Mello, Savas Parastatidis, Phil...
WIMOB
2009
IEEE
15 years 10 months ago
Interference across Multi-hop Wireless Chains
—Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher...
Vinay Kolar, Saquib Razak, Nael B. Abu-Ghazaleh, P...
147
Voted
ATAL
2004
Springer
15 years 9 months ago
Towards the Application of Argumentation-Based Dialogues for Education
This paper describes our work constructing a generalized framework for modeling multi agent interactions in education-related applications. Historically, interactive learning syst...
Elizabeth Sklar, Simon Parsons
134
Voted
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin