Sciweavers

296 search results - page 50 / 60
» Policies and Roles in Collaborative Applications
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 4 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
14 years 2 months ago
Hysteretic q-learning : an algorithm for decentralized reinforcement learning in cooperative multi-agent teams
— Multi-agent systems (MAS) are a field of study of growing interest in a variety of domains such as robotics or distributed controls. The article focuses on decentralized reinf...
Laëtitia Matignon, Guillaume J. Laurent, Nadi...
ESCIENCE
2006
IEEE
14 years 1 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...
ICDCS
1999
IEEE
14 years 5 days ago
Stateful Group Communication Services
group multicasts provide a nice abstraction for communicating data reliably among group members and have been used for a variety of applications. In this paper we present Corona, ...
Radu Litiu, Atul Prakash
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 8 months ago
On Using Matching Theory to Understand P2P Network Design
This paper aims to provide insight into stability of collaboration choices in P2P networks. We study networks where exchanges between nodes are driven by the desire to receive the...
Dmitry Lebedev, Fabien Mathieu, Laurent Viennot, A...