Sciweavers

282 search results - page 28 / 57
» Private Policy Negotiation
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...
CACM
2004
87views more  CACM 2004»
13 years 7 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
CRW
1998
Springer
332views Robotics» more  CRW 1998»
13 years 11 months ago
Communication in Domains with Unreliable, Single-Channel, Low-Bandwidth Communication
In most multiagent systems with communicating agents, the agents have the luxury of using reliable, multi-step negotiation protocols. They can do so primarily when communication i...
Peter Stone, Manuela M. Veloso
AIL
2005
90views more  AIL 2005»
13 years 7 months ago
Towards a multi-agent system for regulated information exchange in crime investigations
This paper outlines a multi-agent architecture for regulated information exchange of crime investigation data between police forces. Interactions between police officers about info...
Pieter Dijkstra, Floris Bex, Henry Prakken, Kees d...
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...