Sciweavers

472 search results - page 37 / 95
» The Case for Informed Transport Protocols
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 24 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ATAL
2004
Springer
14 years 2 months ago
A Combinatorial Auction Protocol among Versatile Experts and Amateurs
Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned items is ofte...
Takayuki Ito, Makoto Yokoo, Shigeo Matsubara
ATAL
2003
Springer
14 years 2 months ago
Coalition formation with uncertain heterogeneous information
Coalition formation methods allow agents to join together and are thus necessary in cases where tasks can only be performed cooperatively by groups. This is the case in the Reques...
Sarit Kraus, Onn Shehory, Gilad Taase
INFOCOM
2005
IEEE
14 years 2 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
PODC
1994
ACM
14 years 1 months ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes