Sciweavers

2055 search results - page 304 / 411
» Generic Model Refactorings
Sort
View
ATC
2007
Springer
15 years 8 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
WAPCV
2007
Springer
15 years 7 months ago
Learning to Attend - From Bottom-Up to Top-Down
The control of overt visual attention relies on an interplay of bottom-up and top-down mechanisms. Purely bottom-up models may provide a reasonable account of the looking behaviors...
Hector Jasso, Jochen Triesch
WER
2007
Springer
15 years 7 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher
ATAL
2005
Springer
15 years 7 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
113
Voted
BIRTHDAY
2005
Springer
15 years 7 months ago
Natural Language Proof Explanation
Abstract. State-of-the-art proof presentation systems suffer from several deficiencies. First, they simply present the proofs without motivating why the proof is done as it is do...
Armin Fiedler