Sciweavers

17409 search results - page 3367 / 3482
» The Design and Performance of MedJava
Sort
View
131
Voted
USS
2008
15 years 6 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ASPLOS
2008
ACM
15 years 5 months ago
Tapping into the fountain of CPUs: on operating system support for programmable devices
The constant race for faster and more powerful CPUs is drawing to a close. No longer is it feasible to significantly increase the speed of the CPU without paying a crushing penalt...
Yaron Weinsberg, Danny Dolev, Tal Anker, Muli Ben-...
ATAL
2008
Springer
15 years 5 months ago
Does the contingency of agents' nonverbal feedback affect users' social anxiety?
We explored the association between users' social anxiety and the interactional fidelity of an agent (also referred to as a virtual human), specifically addressing whether th...
Sin-Hwa Kang, Jonathan Gratch, Ning Wang, James H....
141
Voted
ATAL
2008
Springer
15 years 5 months ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
131
Voted
ATAL
2008
Springer
15 years 5 months ago
An interactive platform for auction-based allocation of loads in transportation logistics
This paper describes an agent-based platform for the allocation of loads in distributed transportation logistics, developed as a collaboration between CWI, Dutch National Center f...
Valentin Robu, Han Noot, Han La Poutré, Wil...
« Prev « First page 3367 / 3482 Last » Next »