Sciweavers

1683 search results - page 152 / 337
» A Needed Narrowing Strategy
Sort
View
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 9 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
ATAL
2003
Springer
15 years 9 months ago
Autonomy and Agent Deliberation
Abstract. An important aspect of agent autonomy is the decision making capability of the agents. We discuss several issues that agents need to deliberate about in order to decide w...
Mehdi Dastani, Frank Dignum, John-Jules Ch. Meyer
ATAL
2003
Springer
15 years 9 months ago
Minimizing communication cost in a distributed Bayesian network using a decentralized MDP
In complex distributed applications, a problem is often decomposed into a set of subproblems that are distributed to multiple agents. We formulate this class of problems with a tw...
Jiaying Shen, Victor R. Lesser, Norman Carver
ICCS
2003
Springer
15 years 9 months ago
Performance Instrumentation and Measurement for Terascale Systems
As computer systems grow in size and complexity, tool support is needed to facilitate the efficient mapping of large-scale applications onto these systems. To help achieve this ma...
Jack Dongarra, Allen D. Malony, Shirley Moore, Phi...
COMPSAC
2002
IEEE
15 years 9 months ago
Renaissance: A Method to Support Software System Evolution
Legacy systems are often business critical and are associated with high maintenance costs. In this paper, we present an overview of a method, Renaissance, which aims to manage the...
Ian Warren, Jane Ransom