Sciweavers

1773 search results - page 336 / 355
» An Architecture for Emotional Agents
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 3 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
ICDCSW
2003
IEEE
14 years 3 months ago
MESH Mdl - A Middleware for Self-Organization in Ad Hoc Networks
— The maturing domain of ad hoc networking still holds some major challenges on its way to commercial exploitation. The dynamic and decentralized nature of ad hoc networks calls ...
Klaus Herrmann
SAC
2003
ACM
14 years 3 months ago
Eliciting Coordination Policies from Requirements
Software coordination models and languages describe how agents, resources and processes work together to implement a software system. One of their limitations is that they are use...
Henry Muccini, Fabio Mancinelli
WETICE
2002
IEEE
14 years 2 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...