Sciweavers

1166 search results - page 190 / 234
» Negotiating Using Rewards
Sort
View
USS
2010
13 years 5 months ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
WOA
2010
13 years 5 months ago
A Multi-Agent Implementation of Social Networks
In this paper, we present a multi-agent system implementing a fully distributed Social Network System supporting user profiles as FOAF profiles. This system is built around the ide...
Enrico Franchi
ISCI
2010
146views more  ISCI 2010»
13 years 5 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
ICIP
2003
IEEE
14 years 9 months ago
Non-linear 3D rendering workload prediction based on a combined fuzzy-neural network architecture for grid computing application
Although, computational Grid has been initially developed to solve large-scale scientific research problems, it is extended for commercial and industrial applications. An interest...
John K. Doulamis, Anastasios D. Doulamis
CHI
2008
ACM
14 years 8 months ago
A co-located interface for narration to support reconciliation in a conflict: initial results from Jewish and Palestinian youth
So called intractable conflicts may benefit from more modest and socially oriented approaches than those based on classical conflict resolution techniques. This paper is inspired ...
Oliviero Stock, Massimo Zancanaro, Chaya Koren, Ce...