Sciweavers

1054 search results - page 180 / 211
» A Formalization of the Turing Test
Sort
View
SOCO
2008
Springer
14 years 11 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
IS
2007
14 years 11 months ago
A configurable reference modelling language
Enterprise Systems (ES) are comprehensive off-the-shelf packages that have to be configured to suit the requirements of an organization. Most ES solutions provide reference models...
Michael Rosemann, Wil M. P. van der Aalst
TKDE
2008
103views more  TKDE 2008»
14 years 11 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
AAMAS
1999
Springer
14 years 11 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
TASLP
2002
79views more  TASLP 2002»
14 years 11 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin