Sciweavers

2927 search results - page 191 / 586
» Secure Distributed Human Computation
Sort
View
91
Voted
CHI
2010
ACM
15 years 9 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
141
Voted
NCA
2006
IEEE
15 years 8 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...
147
Voted
IAT
2010
IEEE
15 years 14 days ago
Continuous Double Auction in Grid Computing: An Agent Based Approach to Maximize Profit for Providers
Economic models are found efficient in managing heterogeneous computer resources such as storage, CPU and memory for grid computing. Commodity market, double auction and contract-n...
S. M. Aminul Haque, Saadat M. Alhashmi, Rajendran ...
CSE
2009
IEEE
15 years 9 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings
AIS
2006
Springer
15 years 2 months ago
Computers and knowledge: a dialogical approach
Artificial intelligence researchers interested in knowledge and in designing and implementing digitized artifacts for representing or sharing knowledge play a crucial role in the ...
Christian Brassac