Sciweavers

6253 search results - page 1040 / 1251
» Use Case Modeling Guidelines
Sort
View
JSW
2007
147views more  JSW 2007»
15 years 4 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
151
Voted
AI
1998
Springer
15 years 3 months ago
Recovery of (Non)Monotonic Theories
We present a framework for recovery of nonmonotonic theories, i.e. of theories that are interpreted using a nonmonotonic semantics. Recovery of a nonmonotonic theory is needed if ...
Cees Witteveen, Wiebe van der Hoek
TIT
2002
90views more  TIT 2002»
15 years 3 months ago
Optimal sequences for CDMA under colored noise: A Schur-saddle function property
We consider direct sequence code division multiple access (DS-CDMA), modeling interference from users communicating with neighboring base stations by additive colored noise. We con...
Pramod Viswanath, Venkat Anantharam
SPIRE
2010
Springer
15 years 2 months ago
Succinct Representations of Dynamic Strings
The rank and select operations over a string of length n from an alphabet of size σ have been used widely in the design of succinct data structures. In many applications, the stri...
Meng He, J. Ian Munro
COGSR
2010
102views more  COGSR 2010»
14 years 11 months ago
Emergence of self-organized symbol-based communication in artificial creatures
In this paper, we describe a digital scenario where we simulated the emergence of self-organized symbol-based communication among artificial creatures inhabiting a virtual world of...
Angelo Loula, Ricardo R. Gudwin, Charbel Niñ...
« Prev « First page 1040 / 1251 Last » Next »