Sciweavers

282 search results - page 40 / 57
» Private Policy Negotiation
Sort
View
CLIMA
2004
13 years 10 months ago
Verifying Protocol Conformance for Logic-Based Communicating Agents
Communication plays a fundamental role in multi-agents systems. One of the main issues in the design of agent interaction protocols is the verification that a given protocol implem...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
IOR
2011
96views more  IOR 2011»
13 years 3 months ago
On the Minimax Complexity of Pricing in a Changing Environment
We consider a pricing problem in an environment where the customers’ willingness-to-pay (WtP) distribution may change at some point over the selling horizon. Customers arrive se...
Omar Besbes, Assaf J. Zeevi
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
TABLETOP
2008
IEEE
14 years 2 months ago
On top of tabletop: A virtual touch panel display
In the real world, a physical tabletop provides public and private needs for people around the table. For competing scenarios such as playing a poker game or running a price negot...
Li-Wei Chan, Ting-Ting Hu, Jin-Yao Lin, Yi-Ping Hu...
ISM
2005
IEEE
169views Multimedia» more  ISM 2005»
14 years 2 months ago
A Framework to Improve QoS and Mobility Management for Multimedia Applications in the IMS
The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Fabricio Carvalho de Gouveia, Thomas Magedanz