Sciweavers

2462 search results - page 341 / 493
» Consistent cooperative localization
Sort
View
DAC
1997
ACM
15 years 8 months ago
Electronic Component Information Exchange (ECIX)
A number of industry trends are shaping the requirements for IC and electronic equipment design. The density and complexity of circuit technologies have increased to a point where...
Donald R. Cottrell
133
Voted
MOBICOM
1996
ACM
15 years 8 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
149
Voted
UM
2010
Springer
15 years 8 months ago
Ranking Feature Sets for Emotion Models Used in Classroom Based Intelligent Tutoring Systems
Abstract. Recent progress has been made by using sensors with Intelligent Tutoring Systems in classrooms in order to predict the affective state of students users. If tutors are a...
David G. Cooper, Kasia Muldner, Ivon Arroyo, Bever...
ACSC
2004
IEEE
15 years 8 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
ECAI
2006
Springer
15 years 8 months ago
Cheating Is Not Playing: Methodological Issues of Computational Game Theory
Abstract. Computational Game Theory is a way to study and evaluate behaviors using game theory models, via agent-based computer simulations. One of the most known example of this a...
Bruno Beaufils, Philippe Mathieu