Sciweavers

67 search results - page 3 / 14
» When Ambients Cannot Be Opened
Sort
View
AVI
2010
13 years 3 months ago
Seeing the self in the washing machine: the deep affordance of 2.0 philosophy in the household appliance domain
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...
Caterina Calefato, Enrico Frumento, Monica Milani,...
ATAL
2008
Springer
13 years 7 months ago
Specifying and enforcing norms in artificial institutions
In this paper we investigate two related aspects of the formalization of open interaction systems: how to specify norms, and how to enforce them by means of sanctions. The problem...
Nicoletta Fornara, Marco Colombetti
LADS
2009
Springer
13 years 10 months ago
Detecting Exceptions in Commitment Protocols: Discovering Hidden States
—Open multiagent systems consist of autonomous agents that are built by different vendors. In principle, open multiagent systems cannot provide any guarantees about the behaviors...
Özgür Kafali, Pinar Yolum
TCC
2009
Springer
151views Cryptology» more  TCC 2009»
14 years 6 months ago
Secret Sharing and Non-Shannon Information Inequalities
The known secret-sharing schemes for most access structures are not efficient; even for a one-bit secret the length of the shares in the schemes is 2O(n) , where n is the number of...
Amos Beimel, Ilan Orlov
ICMLA
2009
13 years 3 months ago
Alive on Back-feed Culprit Identification via Machine Learning
We describe an application of machine learning techniques toward the problem of predicting which network protector switch is the cause of an Alive on Back-Feed (ABF) event in the ...
Bert C. Huang, Ansaf Salleb-Aouissi, Philip Gross