Sciweavers

6137 search results - page 985 / 1228
» Securing Collaborative Applications
Sort
View
FC
2007
Springer
128views Cryptology» more  FC 2007»
15 years 8 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
115
Voted
ICCS
2007
Springer
15 years 8 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
ICLP
2007
Springer
15 years 8 months ago
Universal Timed Concurrent Constraint Programming
Abstract In this doctoral work we aim at developing a rich timed concurrent constraint (tcc) based language with strong ties to logic. The new calculus called Universal Timed Concu...
Carlos Olarte, Catuscia Palamidessi, Frank Valenci...
112
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
89
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst