Sciweavers

51 search results - page 5 / 11
» IT policy: Science policy isn't always about science
Sort
View
ACSC
2003
IEEE
15 years 2 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
69
Voted
ATAL
2010
Springer
14 years 10 months ago
Frequency adjusted multi-agent Q-learning
Multi-agent learning is a crucial method to control or find solutions for systems, in which more than one entity needs to be adaptive. In today's interconnected world, such s...
Michael Kaisers, Karl Tuyls
RTA
2005
Springer
15 years 2 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
15 years 3 months ago
Social Facilitators and Inhibitors to Online Fluency
Studies of Internet use continue to show a gap between those with and without access to the Internet and its resources. However, recent work indicates that this is not a straightf...
Caroline Haythornthwaite
ICALP
2003
Springer
15 years 2 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...