Sciweavers

2227 search results - page 363 / 446
» Reversibility and Models for Concurrency
Sort
View
CHI
2004
ACM
14 years 3 months ago
How do users think about ubiquitous computing?
As ubiquitous computing technology migrates into the home environment, there has been a concurrent effort to allow users to build and customize such technologies to suit their own...
Khai N. Truong, Elaine M. Huang, Molly M. Stevens,...
ATAL
2004
Springer
14 years 3 months ago
Adaptive, Confidence-Based Multiagent Negotiation Strategy
We propose an adaptive 1-to-many negotiation strategy for multiagent coalition formation in dynamic, uncertain, real-time, and noisy environments. Our strategy focuses on multi-is...
Leen-Kiat Soh, Xin Li
ESORICS
2004
Springer
14 years 3 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
GG
2004
Springer
14 years 3 months ago
Fundamental Theory for Typed Attributed Graph Transformation
The concept of typed attributed graph transformation is most significant for modeling and meta modeling in software engineering and visual languages, but up to now there is no ade...
Hartmut Ehrig, Ulrike Prange, Gabriele Taentzer
ICPPW
2003
IEEE
14 years 3 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao