Sciweavers

1419 search results - page 267 / 284
» Network Growth with Feedback
Sort
View
CSFW
2000
IEEE
15 years 3 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
AMI
2008
Springer
15 years 1 months ago
Designing Acceptable Assisted Living Services for Elderly Users
With today's technology, elderly users could be supported in living independently in their own homes for a prolonged period of time. Commercially available products enable rem...
Martijn H. Vastenburg, Thomas Visser, Marieke Verm...
KESAMSTA
2010
Springer
15 years 1 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
EKAW
2008
Springer
15 years 1 months ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...
ARCSF
2008
15 years 1 months ago
Probabilistic Prediction of Student Affect from Hand Gestures
Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...