Sciweavers

1116 search results - page 222 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
122
Voted
AI
2008
Springer
15 years 15 days ago
Strategic bidding in continuous double auctions
In this paper, we describe a novel bidding strategy that autonomous trading agents can use to participate in Continuous Double Auctions (CDAs). Our strategy is based on both short...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
118
Voted
CVIU
2008
126views more  CVIU 2008»
15 years 14 days ago
Optimising dynamic graphical models for video content analysis
A key problem in video content analysis using dynamic graphical models is to learn a suitable model structure given some observed visual data. We propose a Completed Likelihood AI...
Tao Xiang, Shaogang Gong
JUCS
2008
145views more  JUCS 2008»
15 years 10 days ago
Ontoolcole: Supporting Educators in the Semantic Search of CSCL Tools
Abstract: Collaborative learning systems can be constructed following the serviceoriented computing paradigm. This allows educators to integrate external tools, offered as services...
Guillermo Vega-Gorgojo, Miguel L. Bote-Lorenzo, Ed...
JWSR
2007
172views more  JWSR 2007»
15 years 8 days ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...
104
Voted
CORR
2002
Springer
131views Education» more  CORR 2002»
15 years 6 days ago
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs
for data abstraction and justifies reasoning by simulation. Representation independence has been shown for a variety of languages and constructs but not for shared references to mu...
Anindya Banerjee, David A. Naumann