Sciweavers

878 search results - page 84 / 176
» Choice and development
Sort
View
WSNA
2003
ACM
15 years 6 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
ECAI
1998
Springer
15 years 5 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans
ATAL
2008
Springer
15 years 3 months ago
Multi agent based simulation of transport chains
An agent-based tool for micro-level simulation of transport chains (TAPAS) is described. It is more powerful than traditional approaches as it is able to capture the interactions ...
Paul Davidsson, Johan Holmgren, Jan A. Persson, Li...
IE
2007
15 years 2 months ago
Sam Fisher versus Immanuel Kant: the ethics of interactive media
This paper explores the notion of ethical engagement in interactive media through an examination of the Splinter Cell series of games. Keywords Interactive Media, Ethics, Stealth ...
Scott Beattie
IMC
2007
ACM
15 years 2 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum