Sciweavers

826 search results - page 155 / 166
» What Triggers a Behavior
Sort
View
CIA
2004
Springer
14 years 3 months ago
Design and Implementation of Agent Community Based Peer-to-Peer Information Retrieval Method
This paper presents an agent community based peer-to-peer information retrieval method called ACP2P method[16] and discusses the experimental results of the method. The ACP2P metho...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CCGRID
2003
IEEE
14 years 3 months ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
14 years 3 months ago
Adoption Process of Upgrading Software: An Empirical Study of Windows XP
There are many studies in Information Systems on the adoption of new innovations. This paper, on the other hand, presents the findings of an empirical study, which explores factor...
Michael C. L. Lai, Susanna S. Y. Ho, Wendy W. Y. H...
WPES
2003
ACM
14 years 3 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett