Sciweavers

2001 search results - page 294 / 401
» An Update on Generalized Information Theory
Sort
View
ATAL
2005
Springer
14 years 3 months ago
Formation of cooperation structure by interaction network in directed multi-agent
A directed agent implies an agent with high constraints in both recognition and motion. Because of the embodied restrictions, the directed agent perceives a sense of subjective di...
Kosuke Sekiyama, Yukihisa Okade
AUSAI
2005
Springer
14 years 3 months ago
Adaptive Utility-Based Scheduling in Resource-Constrained Systems
This paper addresses the problem of scheduling jobs in soft real-time systems, where the utility of completing each job decreases over time. We present a utility-based framework fo...
David Vengerov
CCS
2005
ACM
14 years 3 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
14 years 3 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
ICMI
2005
Springer
107views Biometrics» more  ICMI 2005»
14 years 3 months ago
Exploring multimodality in the laboratory and the field
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
Lynne Baillie, Raimund Schatz