Sciweavers

575 search results - page 48 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
IGPL
2000
152views more  IGPL 2000»
13 years 7 months ago
An Analysis of Empirical Testing for Modal Decision Procedures
Recent years have seen the emergence of a new generation of heavily-optimised modal decision procedures. Several systems based on such procedures are now available and have proved...
Ian Horrocks, Peter F. Patel-Schneider, Roberto Se...
ICDCS
2007
IEEE
14 years 2 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
SAC
2009
ACM
14 years 2 months ago
Extending PASSI to model multi-agent systems product lines
Multi-agent System Product Lines (MAS-PLs) have emerged to integrate software product lines (SPLs) and agent-oriented software engineering techniques by incorporating their respec...
Ingrid Nunes, Uirá Kulesza, Camila Nunes, E...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 9 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
MM
2004
ACM
277views Multimedia» more  MM 2004»
14 years 1 months ago
Avatar-mediated face tracking and lip reading for human computer interaction
Advanced human computer interaction requires automatic reading of human face in order to make the computer interact with human in the same way as human-to-human communication. We ...
Xiaozhou Wei, Lijun Yin, Zhiwei Zhu, Qiang Ji