Sciweavers

8009 search results - page 16 / 1602
» cans 2005
Sort
View
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
15 years 3 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
70
Voted
AUTOMATICA
2005
121views more  AUTOMATICA 2005»
14 years 10 months ago
Robust state observer and control design using command-to-state mapping
In this paper, by introducing the concept of command-to-state/output mapping, it is shown that the state of an uncertain nonlinear system can robustly be estimated if command-to-s...
Zhihua Qu
ICSM
2005
IEEE
15 years 3 months ago
Strider: Configuration Modelling and Analysis of Complex Systems
This paper describes an approach and support tool for the modelling and analysis of proposed reconfigurations to complex systems. The configuration models used are quick to constr...
Simon Lock
75
Voted
SEFM
2005
IEEE
15 years 3 months ago
A Synchronous Process Calculus for Service Costs
We present a process calculus where synchronous composition is the central algebraic notion; equivalences between processes via bisimilarity or trace can be studied quite simply i...
Siva Anantharaman, Jing Chen, Gaétan Hains
87
Voted
AIED
2005
Springer
15 years 3 months ago
Educational Data Mining: a Case Study
In this paper, we show how using data mining algorithms can help discovering pedagogically relevant knowledge contained in databases obtained from Web-based educational systems. Th...
Agathe Merceron, Kalina Yacef