Sciweavers

683 search results - page 89 / 137
» Unique Group Signatures
Sort
View
AAAI
2004
15 years 1 months ago
Agent-Based Modeling with Social Networks for Terrorist Recruitment
The Seldon model combines concepts from agent-based modeling and social network analysis to create a computation model of social dynamics for terrorist recruitment. The underlying...
Teresa H. Ko, Nina M. Berry
IKE
2003
15 years 1 months ago
Access Control System Using Web Services for XML Messaging Systems
We describe the design of an Access Control System using Web Services for information and content management. In this paper we described the solution for control mechanism of the ...
Ali Kaplan, Ahmet E. Topcu, Marlon E. Pierce, Geof...
COMAD
2009
15 years 28 days ago
A Simple and Efficient Lane Detection using Clustering and Weighted Regression
Developing a vision based, efficient and automatic lane detection system from a moving vehicle is a challenging task mainly due to poor quality of lane markings, occlusion created...
Rudra N. Hota, Shahanaz Syed, Subhadip Bandyopadhy...
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 11 months ago
Dynamic Logic of Common Knowledge in a Proof Assistant
Common knowledge logic is meant to describe situations of the real world where a group of agents is involved. These agents share knowledge and make strong hypotheses on the knowled...
Pierre Lescanne, Jérôme Puissé...
PERCOM
2006
ACM
14 years 11 months ago
Embedding expression: Pervasive computing architecture for art and entertainment
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...