Sciweavers

889 search results - page 172 / 178
» A computational model of achievement motivation for artifici...
Sort
View
OTM
2007
Springer
14 years 2 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
EON
2008
13 years 9 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
GIS
2006
ACM
14 years 9 months ago
Object localization based on directional information case of 2D vector data
If you were told that some object A was perfectly (or somewhat, or not at all) in some direction (e.g., west, above-right) of some reference object B, where in space would you loo...
Stelian Coros, JingBo Ni, Pascal Matsakis
ISI
2008
Springer
13 years 8 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
ICSOC
2010
Springer
13 years 6 months ago
A Programmble Fault Injection Testbed Generator for SOA
In this demo paper we present the prototype of our fault injection testbed generator. Our tool empowers engineers to generate emulated SOA environments and to program fault injecti...
Lukasz Juszczyk, Schahram Dustdar