Sciweavers

2024 search results - page 333 / 405
» A Formal Model of Multi-agent Computations
Sort
View
158
Voted
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
112
Voted
NSPW
2006
ACM
15 years 9 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
127
Voted
WPES
2003
ACM
15 years 8 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
146
Voted
CVPR
2008
IEEE
16 years 5 months ago
Probabilistic graph and hypergraph matching
We consider the problem of finding a matching between two sets of features, given complex relations among them, going beyond pairwise. Each feature set is modeled by a hypergraph ...
Ron Zass, Amnon Shashua
124
Voted
SIGIR
2004
ACM
15 years 9 months ago
Belief revision for adaptive information retrieval
Applying Belief Revision logic to model adaptive information retrieval is appealing since it provides a rigorous theoretical foundation to model partiality and uncertainty inheren...
Raymond Y. K. Lau, Peter Bruza, Dawei Song