Sciweavers

4488 search results - page 842 / 898
» Properties of NP-Complete Sets
Sort
View
CCS
2001
ACM
14 years 14 days ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
CEEMAS
2001
Springer
14 years 14 days ago
UML for Behavior-Oriented Multi-agent Simulations
Developing multi-agent simulations seems to be rather straight forward, as active entities in the original correspond to active agents in the model. Thus plausible behaviors can be...
Christoph Oechslein, Franziska Klügl, Rainer ...
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
14 years 13 days ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
ECOOP
2001
Springer
14 years 13 days ago
Feature Interaction and Composition Problems in Software Product Lines
Features are essential characteristic of applications within a product line. Features organized in different kinds of diagrams containing hierarchies of feature trees are closely ...
Silva Robak, Bogdan Franczyk
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
14 years 12 days ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly