Sciweavers

1116 search results - page 222 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
108
Voted
AI
2008
Springer
14 years 10 months ago
Strategic bidding in continuous double auctions
In this paper, we describe a novel bidding strategy that autonomous trading agents can use to participate in Continuous Double Auctions (CDAs). Our strategy is based on both short...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
101
Voted
CVIU
2008
126views more  CVIU 2008»
14 years 10 months ago
Optimising dynamic graphical models for video content analysis
A key problem in video content analysis using dynamic graphical models is to learn a suitable model structure given some observed visual data. We propose a Completed Likelihood AI...
Tao Xiang, Shaogang Gong
99
Voted
JUCS
2008
145views more  JUCS 2008»
14 years 10 months ago
Ontoolcole: Supporting Educators in the Semantic Search of CSCL Tools
Abstract: Collaborative learning systems can be constructed following the serviceoriented computing paradigm. This allows educators to integrate external tools, offered as services...
Guillermo Vega-Gorgojo, Miguel L. Bote-Lorenzo, Ed...
95
Voted
JWSR
2007
172views more  JWSR 2007»
14 years 10 months ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...
CORR
2002
Springer
131views Education» more  CORR 2002»
14 years 10 months ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann