Sciweavers

887 search results - page 164 / 178
» Representing Systems with Hidden State
Sort
View
ATAL
2005
Springer
15 years 7 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
115
Voted
PODC
2004
ACM
15 years 7 months ago
On the design of distributed protocols from differential equations
We propose a framework to translate certain subclasses of differential equation systems into distributed protocols that are practical. The synthesized protocols are state machine...
Indranil Gupta
101
Voted
EGOV
2004
Springer
15 years 7 months ago
e-Government and Information Society: The First Regional Law in Italy
The law recently approved by the the Regional Administration of Tuscany (January 2004) regulates the promotion of electronic administration and the development of the Information ...
Isabella D'Elia
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
UAIS
2008
172views more  UAIS 2008»
15 years 1 months ago
Recent developments in visual sign language recognition
Abstract Research in the field of sign language recognition has made significant advances in recent years. The present achievements provide the basis for future applications with t...
Ulrich von Agris, Jörg Zieren, Ulrich Canzler...