Sciweavers

12333 search results - page 2205 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
IJCAI
2007
15 years 6 months ago
Emotions as Durative Dynamic State for Action Selection
Human intelligence requires decades of full-time training before it can be reliably utilised in modern economies. In contrast, AI agents must be made reliable but interesting in r...
Emmanuel Tanguy, Philip J. Willis, Joanna Bryson
ACSW
2006
15 years 6 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
148
Voted
SIGCOMM
2010
ACM
15 years 5 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CGF
2008
227views more  CGF 2008»
15 years 4 months ago
Dynamic Sampling and Rendering of Algebraic Point Set Surfaces
Algebraic Point Set Surfaces (APSS) define a smooth surface from a set of points using local moving least-squares (MLS) fitting of algebraic spheres. In this paper we first revisi...
Gaël Guennebaud, Marcel Germann, Markus H. Gr...
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
« Prev « First page 2205 / 2467 Last » Next »