Sciweavers

423 search results - page 37 / 85
» Specifying Strategies for Exercises
Sort
View
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
14 years 8 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
TDP
2010
189views more  TDP 2010»
14 years 4 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
ACSAC
2006
IEEE
15 years 4 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICNP
2006
IEEE
15 years 4 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
HRI
2006
ACM
15 years 3 months ago
Teaching robots by moulding behavior and scaffolding the environment
Programming robots to carry out useful tasks is both a complex and non-trivial exercise. A simple and intuitive method to allow humans to train and shape robot behaviour is clearl...
Joe Saunders, Chrystopher L. Nehaniv, Kerstin Daut...