Sciweavers

359 search results - page 54 / 72
» What to Do About Microsoft
Sort
View
75
Voted
EUC
2006
Springer
15 years 1 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
RE
1995
Springer
15 years 1 months ago
Managing inconsistencies in an evolving specification
In an evolving specification, considerable development time and effort is spent handling recurrent inconsistencies. Tools and techniques for detecting and resolving inconsistencie...
Steve M. Easterbrook, Bashar Nuseibeh
90
Voted
ICML
1994
IEEE
15 years 29 days ago
Learning Without State-Estimation in Partially Observable Markovian Decision Processes
Reinforcement learning (RL) algorithms provide a sound theoretical basis for building learning control architectures for embedded agents. Unfortunately all of the theory and much ...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
FPLAY
2008
14 years 11 months ago
A framework for games literacy and understanding games
Based on research that studied the challenges and difficulties faced by students taking games studies and game design courses, we propose that, while many students enrolled in gam...
José Pablo Zagal
70
Voted
IADIS
2004
14 years 11 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu