Sciweavers

15253 search results - page 2775 / 3051
» Integer-Programming Software Systems
Sort
View
WCRE
2005
IEEE
15 years 9 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
WECWIS
2005
IEEE
141views ECommerce» more  WECWIS 2005»
15 years 9 months ago
An Adaptive Bilateral Negotiation Model for E-Commerce Settings
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...
Vidya Narayanan, Nicholas R. Jennings
139
Voted
WETICE
2005
IEEE
15 years 9 months ago
On P2P Collaboration Infrastructures
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...
Manfred Hauswirth, Ivana Podnar, Stefan Decker
127
Voted
ACMACE
2005
ACM
15 years 9 months ago
MonkeyBridge: autonomous agents in augmented reality games
MonkeyBridge is a collaborative Augmented Reality (AR) game employing autonomous animated agents embodied by lifelike, animated virtual characters and “smart” physical objects...
István Barakonyi, Markus Weilguny, Thomas P...
MM
2005
ACM
124views Multimedia» more  MM 2005»
15 years 9 months ago
MusicStory: a personalized music video creator
In this paper, we describe MusicStory, a system that automatically creates videos to accompany music with lyrics. MusicStory uses common search engines, photo-sharing websites, an...
David A. Shamma, Bryan Pardo, Kristian J. Hammond
« Prev « First page 2775 / 3051 Last » Next »