Sciweavers

933 search results - page 131 / 187
» Extending Forward Checking
Sort
View
HT
2007
ACM
15 years 6 months ago
Image seeds: a communal picture-based narrative
Bitmapping is an art exhibition that seeks to create a linear story path through a collection of photographs. Bitmapping sends registered participants an image to their mobile pho...
Darren Lunn
147
Voted
AAAI
2007
15 years 4 months ago
Filtering, Decomposition and Search Space Reduction for Optimal Sequential Planning
We present in this paper a hybrid planning system which combines constraint satisfaction techniques and planning heuristics to produce optimal sequential plans. It integrates its ...
Stéphane Grandcolas, C. Pain-Barre
118
Voted
CIA
2008
Springer
15 years 4 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
CCS
2008
ACM
15 years 4 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
ECIS
2004
15 years 3 months ago
Perceived risk and trust associated with purchasing at electronic marketplaces
Understanding consumer behavior is of vital importance to consumer oriented e-business models today. In this paper we report on a study into the relationships between consumer per...
Tibert Verhagen, Yao-Hua Tan