Sciweavers

8647 search results - page 1425 / 1730
» The Container Selection Problem
Sort
View
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
15 years 10 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
DSOM
2007
Springer
15 years 10 months ago
Probabilistic Fault Diagnosis Using Adaptive Probing
Past research on probing-based network monitoring provides solutions based on preplanned probing which is computationally expensive, is less accurate, and involves a large manageme...
Maitreya Natu, Adarshpal S. Sethi
EPEW
2007
Springer
15 years 10 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
EUSAI
2007
Springer
15 years 10 months ago
Situated Public News and Reminder Displays
In this paper we present concepts for and experiences with a Situated Public Display system deployed in a university setting. We identify the rate with which information is updated...
Jörg Müller, Oliver Paczkowski, Antonio ...
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 10 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
« Prev « First page 1425 / 1730 Last » Next »