Sciweavers

3505 search results - page 566 / 701
» Information Theory and the IrisCode
Sort
View
ECAI
2004
Springer
15 years 1 months ago
Artificial Agents - Personhood in Law and Philosophy
Thinking about how the law might decide whether to extend legal personhood to artificial agents provides a valuable testbed for philosophical theories of mind. Further, philosophic...
Samir Chopra, Laurence White
E4MAS
2006
Springer
15 years 1 months ago
A Reference Architecture for Situated Multiagent Systems
Abstract. A reference architecture integrates a set of architectural patterns that have proven their value for a family of applications. Such family of applications is characterize...
Danny Weyns, Tom Holvoet
ATAL
2003
Springer
15 years 1 months ago
Agent memory and adaptation in multi-agent systems
We describe a general mechanism for adaptation in multiagent systems in which agents modify their behavior based on their memory of past events. These behavior changes can be elic...
Kristina Lerman, Aram Galstyan
ICSE
2000
IEEE-ACM
15 years 1 months ago
Reverse engineering: a roadmap
By the early 1990s the need for reengineering legacy systems was already acute, but recently the demand has increased significantly with the shift toward web-based user interfaces...
Hausi A. Müller, Jens H. Jahnke, Dennis B. Sm...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel