Sciweavers

1833 search results - page 281 / 367
» Mechanized Verification with Sharing
Sort
View
ATAL
2004
Springer
15 years 10 months ago
The Advantages of Compromising in Coalition Formation with Incomplete Information
This paper presents protocols and strategies for coalition formation with incomplete information under time constraints. It focuses on strategies for coalition members to distribu...
Sarit Kraus, Onn Shehory, Gilad Taase
BPM
2004
Springer
113views Business» more  BPM 2004»
15 years 10 months ago
OPCATeam - Collaborative Business Process Modeling with OPM
While collaboration has become a basic requirement for many development environments, solutions for collaborative modeling are far from being satisfact1ory. OPCATeam, which relies ...
Dov Dori, Dizza Beimel, Eran Toch
GRID
2004
Springer
15 years 10 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao
ICCSA
2004
Springer
15 years 10 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
169
Voted
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho