Sciweavers

5255 search results - page 199 / 1051
» Formal Methods for Privacy
Sort
View
127
Voted
AGENTS
2000
Springer
15 years 8 months ago
A comparison of coordinated planning methods for cooperating rovers
This paper describes and evaluates three methods for coordinating multiple agents. These agents interact in two ways. First, they are able to work together to achieve a common poo...
Steve A. Chien, Anthony Barrett, Tara A. Estlin, G...
MOC
2010
14 years 10 months ago
A direct coupling of local discontinuous Galerkin and boundary element methods
The coupling of local discontinuous Galerkin (LDG) and boundary element methods (BEM), which has been developed recently to solve linear and nonlinear exterior transmission proble...
Gabriel N. Gatica, Norbert Heuer, Francisco-Javier...
AGENTS
2001
Springer
15 years 8 months ago
An auction-based method for decentralized train scheduling
We present a computational study of an auction-based method for decentralized train scheduling. The method is well suited to the natural information and control structure of moder...
David C. Parkes, Lyle H. Ungar
CCS
2004
ACM
15 years 7 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
113
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett