Sciweavers

10910 search results - page 2076 / 2182
» Input modeling using a computer algebra system
Sort
View
IJAOSE
2010
227views more  IJAOSE 2010»
14 years 8 months ago
Implementing reactive BDI agents with user-given constraints and objectives
CASO is an agent-oriented programming language based on AgentSpeak(L), one of the most influential abstract languages based on the BDI (Beliefs-Desires-Intentions) architecture. ...
Aniruddha Dasgupta, Aditya K. Ghose
WWW
2009
ACM
15 years 10 months ago
Automatically assessing resource quality for educational digital libraries
With the rise of community-generated web content, the need for automatic assessment of resource quality has grown, particularly in the realm of educational digital libraries. We d...
Philipp G. Wetzler, Steven Bethard, Kirsten R. But...
MOBISYS
2007
ACM
15 years 9 months ago
Context browsing with mobiles - when less is more
Except for a handful of "mobile" Web sites, the Web is designed for browsing with personal computers with large screens capable of fitting the content of most Web pages....
Yevgen Borodin, Jalal Mahmud, I. V. Ramakrishnan
ASMTA
2009
Springer
104views Mathematics» more  ASMTA 2009»
15 years 4 months ago
Preliminary Results on a Simple Approach to G/G/c-Like Queues
In this paper we consider a multi-server queue with a near general arrival process (represented as an arbitrary state-dependent Coxian distribution), a near general state-dependent...
Alexandre Brandwajn, Thomas Begin
IPPS
2007
IEEE
15 years 4 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
« Prev « First page 2076 / 2182 Last » Next »