Sciweavers

825 search results - page 123 / 165
» Internal Iteration Externalized
Sort
View
AGENTS
1998
Springer
14 years 1 days ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 12 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
ACSAC
2004
IEEE
13 years 11 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh
USENIX
2008
13 years 10 months ago
Bridging the Gap between Software and Hardware Techniques for I/O Virtualization
: The paravirtualized I/O driver domain model, used in Xen, provides several advantages including device driver isolation in a safe execution environment, support for guest VM tran...
Jose Renato Santos, Yoshio Turner, G. John Janakir...
MASCOTS
2010
13 years 9 months ago
New Algorithms for File System Cooperative Caching
: New Algorithms for File System Cooperative Caching Eric Anderson, Christopher Hoover, Xiaozhou Li HP Laboratories HPL-2010-69 cooperative caching We present two new cooperative ...
Eric Anderson, Christopher Hoover, Xiaozhou Li