Sciweavers

9503 search results - page 1846 / 1901
» Authenticated System Calls
Sort
View
ATAL
2008
Springer
14 years 1 months ago
Social norm emergence in virtual agent societies
The advent of virtual environments such as SecondLife call for a distributed approach for norm emergence and spreading. In open virtual environments, monitoring various interactin...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
ICDCS
2010
IEEE
14 years 29 days ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
DIAGRAMS
2006
Springer
14 years 29 days ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel
DAC
2005
ACM
14 years 29 days ago
Hybrid simulation for embedded software energy estimation
Software energy estimation is a critical step in the design of energyefficient embedded systems. Instruction-level simulation techniques, despite several advances, remain too slo...
Anish Muttreja, Anand Raghunathan, Srivaths Ravi, ...
ECAI
2006
Springer
14 years 29 days ago
Count-As Conditionals, Classification and Context
Abstract. Searle represents constitutive norms as count-as conditionals, written as `X counts as Y in context C'. Grossi et al. study a class of these conditionals as `in cont...
Guido Boella, Leendert W. N. van der Torre
« Prev « First page 1846 / 1901 Last » Next »