Sciweavers

1166 search results - page 190 / 234
» Negotiating Using Rewards
Sort
View
USS
2010
15 years 1 days ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
138
Voted
WOA
2010
15 years 1 days ago
A Multi-Agent Implementation of Social Networks
In this paper, we present a multi-agent system implementing a fully distributed Social Network System supporting user profiles as FOAF profiles. This system is built around the ide...
Enrico Franchi
143
Voted
ISCI
2010
146views more  ISCI 2010»
14 years 11 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
108
Voted
ICIP
2003
IEEE
16 years 3 months ago
Non-linear 3D rendering workload prediction based on a combined fuzzy-neural network architecture for grid computing application
Although, computational Grid has been initially developed to solve large-scale scientific research problems, it is extended for commercial and industrial applications. An interest...
John K. Doulamis, Anastasios D. Doulamis
121
Voted
CHI
2008
ACM
16 years 2 months ago
A co-located interface for narration to support reconciliation in a conflict: initial results from Jewish and Palestinian youth
So called intractable conflicts may benefit from more modest and socially oriented approaches than those based on classical conflict resolution techniques. This paper is inspired ...
Oliviero Stock, Massimo Zancanaro, Chaya Koren, Ce...