Sciweavers

5608 search results - page 153 / 1122
» On the Theory of Matchgate Computations
Sort
View
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 5 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
EUROSSC
2009
Springer
15 years 5 months ago
Using Dempster-Shafer Theory of Evidence for Situation Inference
Abstract. In the domain of ubiquitous computing, the ability to identify the occurrence of situations is a core function of being ’contextaware’. Given the uncertain nature of ...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon A. Do...
AAAI
2007
15 years 4 months ago
Towards a Cognitive Model of Crowd Behavior Based on Social Comparison Theory
Models of crowd behavior facilitate analysis and prediction of human group behavior, where people are affected by each other’s presence. Unfortunately, existing models leave man...
Natalie Fridman, Gal A. Kaminka
FECS
2006
80views Education» more  FECS 2006»
15 years 3 months ago
A Redesigned Undergraduate Data Communication and Networking Course Incorporating Theory and Practice
Data Communication and Computer Networking is a traditional undergraduate CS course. Classic teaching focuses on communication protocol and algorithm analysis, plus socket programm...
Ziping Liu
ECIS
2003
15 years 3 months ago
Towards an interdisciplinary theory of networks
Research problems in ICT networks often comprise coordination problems of information infrastructures and require state-of-the-art methods of coping with complex system dynamics. ...
Tim Weitzel, Oliver Wendt, Wolfgang König