Sciweavers

304 search results - page 58 / 61
» Trusted Computing in Mobile Action
Sort
View
CCS
2005
ACM
15 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
91
Voted
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ATAL
2009
Springer
14 years 10 months ago
Efficient physics-based planning: sampling search via non-deterministic tactics and skills
Motion planning for mobile agents, such as robots, acting in the physical world is a challenging task, which traditionally concerns safe obstacle avoidance. We are interested in p...
Stefan Zickler, Manuela M. Veloso
ATAL
2010
Springer
14 years 10 months ago
Closing the learning-planning loop with predictive state representations
A central problem in artificial intelligence is to choose actions to maximize reward in a partially observable, uncertain environment. To do so, we must learn an accurate model of ...
Byron Boots, Sajid M. Siddiqi, Geoffrey J. Gordon
CHI
2011
ACM
14 years 1 months ago
Designing a phone broadcasting system for urban sex workers in India
In this paper, we present the design, implementation, and deployment of a phone-based broadcasting system designed for reaching out to at-risk populations in urban India. We worke...
Nithya Sambasivan, Julie Weber, Edward Cutrell