Sciweavers

11168 search results - page 2083 / 2234
» Abstract State Processes
Sort
View
IFIPTCS
2010
13 years 8 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
IMCSIT
2010
13 years 8 months ago
BeesyBees - Efficient and Reliable Execution of Service-based Workflow Applications for BeesyCluster using Distributed Agents
Abstract--The paper presents an architecture and implementation that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middlewar...
Pawel Czarnul, Mariusz R. Matuszek, Michal W&oacut...
INFOCOM
2010
IEEE
13 years 8 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao
KES
2010
Springer
13 years 8 months ago
Adaptive Modelling of Users' Strategies in Exploratory Learning Using Case-Based Reasoning
Abstract. In exploratory learning environments, learners can use different strategies to solve a problem. To the designer or teacher, however, not all these strategies are known in...
Mihaela Cocea, Sergio Gutiérrez Santos, Geo...
MASS
2010
159views Communications» more  MASS 2010»
13 years 8 months ago
Real-time indoor mapping for mobile robots with limited sensing
Abstract--Mapping and localization for indoor robotic navigation is a well-studied field. However, existing work largely relies on long range perceptive sensors in addition to the ...
Ying Zhang, Juan Liu, Gabriel Hoffmann, Mark Quill...
« Prev « First page 2083 / 2234 Last » Next »