Sciweavers

1419 search results - page 267 / 284
» Network Growth with Feedback
Sort
View
CSFW
2000
IEEE
15 years 1 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
AMI
2008
Springer
15 years 4 days ago
Designing Acceptable Assisted Living Services for Elderly Users
With today's technology, elderly users could be supported in living independently in their own homes for a prolonged period of time. Commercially available products enable rem...
Martijn H. Vastenburg, Thomas Visser, Marieke Verm...
KESAMSTA
2010
Springer
15 years 3 days ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
EKAW
2008
Springer
14 years 12 months ago
An Ontology-Centric Approach to Sensor-Mission Assignment
Sensor-mission assignment involves the allocation of sensor and other information-providing resources to missions in order to cover the information needs of the individual tasks in...
Mario Gomez, Alun D. Preece, Matthew P. Johnson, G...
ARCSF
2008
14 years 11 months ago
Probabilistic Prediction of Student Affect from Hand Gestures
Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...