Sciweavers

25 search results - page 4 / 5
» Empirical exploration in undergraduate operating systems
Sort
View
ATAL
2007
Springer
13 years 12 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...
CCS
2011
ACM
12 years 5 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
CHI
1995
ACM
13 years 9 months ago
Applying Electric Field Sensing to Human-Computer Interfaces
A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric f...
Thomas G. Zimmerman, Joshua R. Smith, Joseph A. Pa...
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
13 years 12 months ago
Mobile RFID - A Case from Volvo on Innovation in SCM
Utilization of Radio Frequency Identification (RFID) is often presented as improving supply chain management even though there are still few in-depth studies that support the hype...
Magnus Holmqvist, Gunnar Stefansson
AINA
2010
IEEE
13 years 10 months ago
Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study
—In the offshore engineering community, reliable deep-water anchor performance is critical for mooring floating platforms such as Mobile Offshore Drilling Units. In a typical in...
Alvin C. Valera, Hwee Pink Tan, Xiaoping Ma