Sciweavers

757 search results - page 141 / 152
» agents 2000
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
DIGITALCITIES
2001
Springer
15 years 1 months ago
Connecting Digital and Physical Cities
As a platform for community networks, public information spaces that mirror the city metaphor are being developed around the world. The aim of digital cities is to pursue a future ...
Toru Ishida, Hiroshi Ishiguro, Hideyuki Nakanishi
AIWORC
2000
IEEE
15 years 1 months ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
DEXAW
2000
IEEE
89views Database» more  DEXAW 2000»
15 years 1 months ago
A Conceptual Architecture for a Combined Negotiation Support System
In a combined negotiation in e-commerce, the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are inde...
Morad Benyoucef, Rudolf K. Keller
ICRA
2000
IEEE
104views Robotics» more  ICRA 2000»
15 years 1 months ago
Social Potentials for Scalable Multi-Robot Formations
Potential function approaches to robot navigation provide an elegant paradigm for expressing multiple constraints and goals in mobile robot navigation problems 9]. As an example, ...
Tucker R. Balch, Maria Hybinette