Sciweavers

1407 search results - page 137 / 282
» Systems Theory Model for Information Security
Sort
View
AGENTS
2000
Springer
14 years 18 days ago
Scalability of a Transactional Infrastructure for Multi-Agent Systems
Abstract. One of the reasons for attending to agent technology is the evergrowing complexity of information systems and the increasing difficulty to foresee and plan for all potent...
Khaled Nagi
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 8 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
WWW
2010
ACM
14 years 1 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
13 years 9 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
JCNS
2007
77views more  JCNS 2007»
13 years 8 months ago
Threshold fatigue and information transfer
Neurons in vivo must process sensory information in the presence of significant noise. It is thus plausible to assume that neural systems have developed mechanisms to reduce this n...
Maurice J. Chacron, Benjamin Lindner, André...