Sciweavers

11168 search results - page 2083 / 2234
» Abstract State Processes
Sort
View
121
Voted
IFIPTCS
2010
15 years 17 days ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
120
Voted
IMCSIT
2010
15 years 16 days ago
BeesyBees - Efficient and Reliable Execution of Service-based Workflow Applications for BeesyCluster using Distributed Agents
Abstract--The paper presents an architecture and implementation that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middlewar...
Pawel Czarnul, Mariusz R. Matuszek, Michal W&oacut...
125
Voted
INFOCOM
2010
IEEE
15 years 16 days ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
113
Voted
KES
2010
Springer
15 years 16 days ago
Adaptive Modelling of Users' Strategies in Exploratory Learning Using Case-Based Reasoning
Abstract. In exploratory learning environments, learners can use different strategies to solve a problem. To the designer or teacher, however, not all these strategies are known in...
Mihaela Cocea, Sergio Gutiérrez Santos, Geo...
140
Voted
MASS
2010
159views Communications» more  MASS 2010»
15 years 16 days ago
Real-time indoor mapping for mobile robots with limited sensing
Abstract--Mapping and localization for indoor robotic navigation is a well-studied field. However, existing work largely relies on long range perceptive sensors in addition to the ...
Ying Zhang, Juan Liu, Gabriel Hoffmann, Mark Quill...
« Prev « First page 2083 / 2234 Last » Next »