Sciweavers

1384 search results - page 104 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
CORR
2006
Springer
95views Education» more  CORR 2006»
14 years 10 months ago
The computational power of population protocols
We consider the model of population protocols introduced by Angluin et al. [AAD+ 04], in which anonymous finite-state agents stably compute a predicate of the multiset of their in...
Dana Angluin, James Aspnes, David Eisenstat, Eric ...
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
HRI
2007
ACM
15 years 1 months ago
Efficient model learning for dialog management
Intelligent planning algorithms such as the Partially Observable Markov Decision Process (POMDP) have succeeded in dialog management applications [10, 11, 12] because of their rob...
Finale Doshi, Nicholas Roy
ICECCS
1997
IEEE
125views Hardware» more  ICECCS 1997»
15 years 2 months ago
Client--Access Protocols for Replicated Services
The paper addresses the problem of client–service interaction in the case of replicated service provision. Existing systems that follow the State Machine approach concentrate on...
Christos T. Karamanolis, Jeff Magee
SAC
2010
ACM
15 years 4 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev