Sciweavers

1990 search results - page 346 / 398
» Integrated Human Behavior Modeling
Sort
View
96
Voted
AO
2007
111views more  AO 2007»
14 years 11 months ago
Let's talk about our "being": A linguistic-based ontology framework for coordinating agents
Abstract. In open scenarios, agents willing to cooperate must impact the communication barrier between them and their unknown partners. If agents are not relying on any agreement a...
Maria Teresa Pazienza, Savino Sguera, Armando Stel...
105
Voted
CGF
2008
124views more  CGF 2008»
14 years 11 months ago
Real-time Animation of Sand-Water Interaction
Recent advances in physically-based simulations have made it possible to generate realistic animations. However, in the case of solid-fluid coupling, wetting effects have rarely b...
Witawat Rungjiratananon, Zoltan Szego, Yoshihiro K...
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 11 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
AC
2005
Springer
14 years 11 months ago
Power Analysis and Optimization Techniques for Energy Efficient Computer Systems
Reducing power consumption has become a major challenge in the design and operation of today's computer systems. This chapter describes different techniques addressing this c...
Wissam Chedid, Chansu Yu, Ben Lee
TCS
2008
14 years 11 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld