Sciweavers

3686 search results - page 425 / 738
» Comprehensive comprehensions
Sort
View
AMR
2005
Springer
140views Multimedia» more  AMR 2005»
15 years 9 months ago
Integrating Media Management Towards Ambient Intelligence
As Consumer Electronics devices get interconnected, the issue of aligning their data management solutions becomes prominent. If we want to deploy comprehensive applications that ar...
Willem Fontijn, Jan Nesvadba, Alexander Sinitsyn
ATAL
2005
Springer
15 years 9 months ago
Argument-based negotiation in a social context
Argumentation-based negotiation (ABN) provides agents with an effective means to resolve conflicts within a multi-agent society. However, to engage in such argumentative encounter...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
CEAS
2005
Springer
15 years 9 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
CHARME
2005
Springer
176views Hardware» more  CHARME 2005»
15 years 9 months ago
An Analysis of SAT-Based Model Checking Techniques in an Industrial Environment
Abstract. Model checking is a formal technique for automatically verifying that a finite-state model satisfies a temporal property. In model checking, generally Binary Decision D...
Nina Amla, Xiaoqun Du, Andreas Kuehlmann, Robert P...
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 9 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider