An angent based approach to modeling the secure electronic transaction protocol.
Kleftouris, D.N., Maragos, N., Ziogou, C., Mouchos, Ch. (2003)
Acta Universitatis Apulensis. Mathematics - Informatics
Similarity:
Kleftouris, D.N., Maragos, N., Ziogou, C., Mouchos, Ch. (2003)
Acta Universitatis Apulensis. Mathematics - Informatics
Similarity:
Amelia Bădică, Costin Bădică (2011)
International Journal of Applied Mathematics and Computer Science
Similarity:
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of requester with provider agents requires the use of specialized agents known as middle-agents. In this paper, we propose a formal framework intended to precisely characterize types of middle-agents with a special focus on matchmakers, brokers and front-agents by formally modeling their interactions with requesters...
Dragoslav Pešović, Milan Vidaković, Mirjana Ivanović, Zoran Budimac, Jovana Vidaković (2011)
Computer Science and Information Systems
Similarity:
Dimov, Aleksandar, Ilieva, Sylvia (2007)
Serdica Journal of Computing
Similarity:
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshko ff and Lubomir Tschakaloff , Sofi a, July, 2006. Component-based software engineering and software architecture are tightly connected areas in computer science. Software architecture presents the functionality of the system as decomposition into components, the properties of these components and the connectors between them. This paper illustrates a...
Milan Vidaković, Branko Milosavljević, Zora Konjović, Goran Sladić (2009)
Computer Science and Information Systems
Similarity:
Tarcsi, Adam (2008)
Serdica Journal of Computing
Similarity:
With the development of the Internet culture applications are becoming simpler and simpler, users need less IT knowledge than earlier; from the ‘reader’ status they have reached that of the content creator and editor. In our days, the effects of the web are becoming stronger and stronger— computer-aided work is conventional almost everywhere. The spread of the Internet applications has several reasons: first of all, their accessibility is widespread; second, their use is not limited...
Hatzigaidas, Athanasios, Papastergiou, Anastasia, Tryfon, George, Maritsa, Despoina (2003)
Acta Universitatis Apulensis. Mathematics - Informatics
Similarity:
Dejan Risimic (2007)
The Yugoslav Journal of Operations Research
Similarity:
Jiri Horak, Jan Unucka, Josef Stromsky, Vladimir Marsik, Antonin Orlik (2006)
Control and Cybernetics
Similarity:
Stefanova, Kamelia, Nikolov, Roumen (2008)
Serdica Journal of Computing
Similarity:
The authors analyse some of the research outcomes achieved during the implementation of the EC GUIDE research project “Creating an European Identity Management Architecture for eGovernment”, as well as their personal experience. The project goals and achievements are however considered in a broader context. The key role of Identity in the Information Society was emphasised, that the research and development in this field is in its initial phase. The scope of research related to Identity,...
Chelai, Ozten (2003)
Analele Ştiinţifice ale Universităţii “Ovidius" Constanţa. Seria: Matematică
Similarity: