Sciweavers

867 search results - page 111 / 174
» SQL Server 2005
Sort
View
AAAI
2006
15 years 3 months ago
Know Thine Enemy: A Champion RoboCup Coach Agent
In a team-based multiagent system, the ability to construct a model of an opponent team's joint behavior can be useful for determining an agent's expected distribution o...
Gregory Kuhlmann, William B. Knox, Peter Stone
134
Voted
ACTA
2005
104views more  ACTA 2005»
15 years 2 months ago
Subtyping for session types in the pi calculus
Extending the pi calculus with the session types proposed by Honda et al. allows high-level specifications of structured patterns of communication, such as client-server protocols,...
Simon J. Gay, Malcolm Hole
AMC
2005
218views more  AMC 2005»
15 years 2 months ago
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Abstract. Key authentication is very important in secret communications and data security. Recently, Lee, Hwang and Li proposed a new public key authentication scheme for cryptosys...
Fangguo Zhang, Kwangjo Kim
CACM
2005
84views more  CACM 2005»
15 years 2 months ago
Information dissemination via wireless broadcast
them as an abstract cellular model where users access information through access points. ract model consists of a base station, a number of clients, and a number of channels. A cli...
Baihua Zheng, Dik Lun Lee
131
Voted
MOBISYS
2005
ACM
16 years 2 months ago
LiveMail: personalized avatars for mobile entertainment
LiveMail is a prototype system that allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user takes a s...
Miran Mosmondor, Tomislav Kosutic, Igor S. Pandzic