Sciweavers

52 search results - page 9 / 11
» Constructive knowledge: what agents can achieve under imperf...
Sort
View
ACL
1992
13 years 6 months ago
The Representation of Multimodal User Interface Dialogues Using Discourse Pegs
The three-tiered discourse representation defined in (Luperfoy, 1991) is applied to multimodal humancomputer interface (HCI) dialogues. In the applied system the three tiers are (...
Susann LuperFoy
CLUSTER
2004
IEEE
13 years 8 months ago
Application-specific scheduling for the organic grid
We propose a biologically inspired and fully-decentralized approach to the organization of computation that is based on the autonomous scheduling of strongly mobile agents on a pe...
Arjav J. Chakravarti, Gerald Baumgartner, Mario La...
POLICY
2005
Springer
13 years 10 months ago
Embedding Policy Rules for Software-Based Systems in a Requirements Context
Policy rules define what behavior is desired in a softwarebased system, they do not describe the corresponding action and event sequences that actually “produce” desired (“...
Mark Strembeck
SOCA
2007
IEEE
13 years 11 months ago
Static Analysis of Business Artifact-centric Operational Models
Business Artifacts are the core entities used by businesses to record information pertinent to their operations. Business operational models are representations of the processing ...
Cagdas E. Gerede, Kamal Bhattacharya, Jianwen Su
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
13 years 12 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger