Sciweavers

2624 search results - page 421 / 525
» The 2LIP model and its implementations
Sort
View
ICWS
2009
IEEE
14 years 6 months ago
An Approach to Incentive-Based Reputation for Communities of Web Services
—Community of web services (CWS) is a society composed by a number of functionally identical web services. The communities always aim to increase their reputation level in order ...
Babak Khosravifar, Jamal Bentahar, Philippe Thiran...
INFOCOM
2009
IEEE
14 years 3 months ago
Network Bandwidth Allocation via Distributed Auctions with Time Reservations
—This paper studies the problem of allocating network capacity through periodic auctions. Motivated primarily by a service overlay architecture, we impose the following condition...
Pablo Belzarena, Andrés Ferragut, Fernando ...
ICN
2009
Springer
14 years 3 months ago
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications
Using internet for media-based real-time collaboration has become widespread activity. In this paper, we present a framework called CoUniverse, designed for building realtime user...
Milos Liska, Petr Holub
ARGMAS
2007
Springer
14 years 3 months ago
Defeasible Argumentation Support for an Extended BDI Architecture
Abstract. In this work, an agent architecture that combines defeasible argumentation and the BDI model is described. Argumentation will be used as a mechanism for reasoning about b...
Nicolás D. Rotstein, Alejandro Javier Garc&...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 3 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye