Sciweavers

887 search results - page 159 / 178
» Security Services in an Open Service Environment
Sort
View
KESAMSTA
2010
Springer
13 years 7 months ago
Modeling and Verifying Business Interactions via Commitments and Dialogue Actions
A variety of business interactions in open environments can be captured in terms of creation and manipulation of social commitments among the agents. Such interactions include B2B ...
Mohamed El-Menshawy, Jamal Bentahar, Rachida Dssou...
TOIT
2010
115views more  TOIT 2010»
13 years 7 months ago
A market-based bandwidth charging framework
The increasing demand for high-bandwidth applications such as video-on-demand and grid computing is reviving interest in bandwidth reservation schemes. Earlier attempts did not ca...
David Michael Turner, Vassilis Prevelakis, Angelos...
IPPS
2010
IEEE
13 years 6 months ago
Meta-scheduling in advance using red-black trees in heterogeneous Grids
Abstract--The provision of Quality of Service in Grid environments is still an open issue that needs attention from the research community. One way of contributing to the provision...
Luis Tomás, Carmen Carrión, Blanca C...
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
14 years 2 months ago
Supervised Learning of Places from Range Data using AdaBoost
— This paper addresses the problem of classifying places in the environment of a mobile robot into semantic categories. We believe that semantic information about the type of pla...
Óscar Martínez Mozos, Cyrill Stachni...
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
14 years 14 days ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine