Sciweavers

454 search results - page 89 / 91
» Negotiating Models
Sort
View
EUROCRYPT
2009
Springer
14 years 8 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
CHI
2003
ACM
14 years 7 months ago
Sense and sensibility: evaluation and interactive art
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Gerd Andersson, Kristina Höök, Phoebe Se...
ATAL
2009
Springer
14 years 1 months ago
The price of democracy in coalition formation
Whenever rational agents form coalitions to execute tasks, doing so via a decentralized negotiation process—while more robust and democratic—may lead to a loss of efficiency ...
Georgios Chalkiadakis, Edith Elkind, Maria Polukar...
HPDC
2007
IEEE
14 years 1 months ago
An architecture for virtual organization (VO)-based effective peering of content delivery networks
The proprietary nature of existing Content Delivery Networks (CDNs) means they are closed and do not naturally cooperate, resulting in “islands” of CDNs. Finding ways for dist...
Al-Mukaddim Khan Pathan, James Broberg, Kris Buben...
ICC
2007
IEEE
184views Communications» more  ICC 2007»
14 years 1 months ago
A 3GPP-IMS Based Approach for Converging Next Generation Mobile Data Networks
— This paper presents a promising architecture for of the 3GPP’s IMS for supporting real-time session negotiation converging third-generation (3G) cellular data networks and an...
Kumudu S. Munasinghe, Abbas Jamalipour