Sciweavers

15636 search results - page 3028 / 3128
» Modelling by supersaturated designs
Sort
View
CCS
2008
ACM
15 years 3 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
IWCMC
2010
ACM
15 years 3 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
CIKM
2008
Springer
15 years 3 months ago
A proposal for chemical information retrieval evaluation
Based on the important progresses made in information retrieval (IR) in terms of theoretical models and evaluations, more and more attention has recently been paid to the research...
Jianhan Zhu, John Tait
HYBRID
2010
Springer
15 years 3 months ago
Receding horizon control for temporal logic specifications
In this paper, we describe a receding horizon scheme that satisfies a class of linear temporal logic specifications sufficient to describe a wide range of properties including saf...
Tichakorn Wongpiromsarn, Ufuk Topcu, Richard M. Mu...
ECAI
2006
Springer
15 years 3 months ago
Fair Distribution of Collective Obligations
Abstract. In social mechanism design, obligation distribution creates individual or contractual obligations that imply a collective obligation. A distinguishing feature from group ...
Guido Boella, Leendert W. N. van der Torre
« Prev « First page 3028 / 3128 Last » Next »