Sciweavers

1809 search results - page 231 / 362
» Using GDE in Educational Systems
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 2 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
CORR
2011
Springer
217views Education» more  CORR 2011»
14 years 8 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins
181
Voted
CORR
2011
Springer
160views Education» more  CORR 2011»
14 years 8 months ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos
WETICE
2000
IEEE
15 years 9 months ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
GLOBECOM
2009
IEEE
15 years 8 months ago
Relay Selection and Data Transmission Throughput Tradeoff in Cooperative Systems
A common and practical paradigm in cooperative communications is the use of a dynamically selected 'best' relay to decode and forward information from a source to a dest...
Virag Shah, Neelesh B. Mehta, Raymond Yim