Sciweavers

759 search results - page 114 / 152
» What Can Be Implemented Anonymously
Sort
View
CSSE
2004
IEEE
13 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
AAMAS
2000
Springer
13 years 9 months ago
Rational Coordination in Multi-Agent Environments
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents, and present a framework that uses this paradigm t...
Piotr J. Gmytrasiewicz, Edmund H. Durfee
CN
2000
107views more  CN 2000»
13 years 9 months ago
Concepts for improved visualization of Web link attributes
This paper discusses methods to generate and display automatically additional hyperlink information to the users of the World Wide Web. Current Web browsers make it hard to predic...
Harald Weinreich, Winfried Lamersdorf
IVC
2002
106views more  IVC 2002»
13 years 9 months ago
Interactive visual dialog
In this paper we propose a paradigm called the Interactive Visual Dialog (IVD) as a means of facilitating a system's ability to recognize objects presented to it by a human. ...
Tal Arbel, Frank P. Ferrie
CN
1999
119views more  CN 1999»
13 years 9 months ago
Web Caching with Consistent Hashing
A key performance measure for the World Wide Web is the speed with which content is served to users. As traffic on the Web increases, users are faced with increasing delays and fa...
David R. Karger, Alex Sherman, Andy Berkheimer, Bi...