Sciweavers

973 search results - page 31 / 195
» Arguing Using Opponent Models
Sort
View
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 9 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
ROBOCUP
2009
Springer
128views Robotics» more  ROBOCUP 2009»
14 years 2 months ago
Sensor and Information Fusion Applied to a Robotic Soccer Team
This paper is focused on the sensor and information fusion techniques used by a robotic soccer team. Due to the fact that the sensor information is affected by noise, and taking in...
João Silva, Nuno Lau, João Rodrigues...
HICSS
1996
IEEE
139views Biometrics» more  HICSS 1996»
13 years 11 months ago
Strictly Class-Based Modeling Considered Harmful
Many object-oriented methods have assumed classbased approaches, without considering prototype-based ones. Some authors, while admitting prototypes as a useful concept, only envis...
Birgitte Krogh, Sean Levy, Allen H. Dutoit, Eswara...
CSREAEEE
2006
82views Business» more  CSREAEEE 2006»
13 years 9 months ago
User-Website Interactive Communication Analysis in Web-Based Information System Development
- Web-based information systems (WBIS) include the website part and the system part, and easy-to-use website is particular critical to the success of WBIS. This paper argues that t...
Ying Liang
ICTIR
2009
Springer
13 years 5 months ago
An Effective Approach to Verbose Queries Using a Limited Dependencies Language Model
Intuitively, any `bag of words' approach in IR should benefit from taking term dependencies into account. Unfortunately, for years the results of exploiting such dependencies ...
Eduard Hoenkamp, Peter Bruza, Dawei Song, Qiang Hu...