Sciweavers

11580 search results - page 2032 / 2316
» Communication vs. Computation
Sort
View
ICISC
2001
162views Cryptology» more  ICISC 2001»
15 years 6 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ECIS
2003
15 years 6 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
ECSCW
2003
15 years 6 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza
MASCOTS
2001
15 years 6 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy
NIPS
2001
15 years 6 months ago
Multiagent Planning with Factored MDPs
We present a principled and efficient planning algorithm for cooperative multiagent dynamic systems. A striking feature of our method is that the coordination and communication be...
Carlos Guestrin, Daphne Koller, Ronald Parr
« Prev « First page 2032 / 2316 Last » Next »