Sciweavers

2940 search results - page 465 / 588
» Behavioral Constraints for Services
Sort
View
BCSHCI
2009
13 years 10 months ago
"A little silly and empty-headed": older adults' understandings of social networking sites
This study suggests reasons for the absence of a growing proportion of the population, the so-called baby boomers, from the otherwise highly popular social networking sites. We ex...
Vilma Lehtinen, Jaana Näsänen, Risto Sar...
CCS
2008
ACM
13 years 10 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
GLOBECOM
2008
IEEE
13 years 9 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
AO
2007
111views more  AO 2007»
13 years 9 months ago
Let's talk about our "being": A linguistic-based ontology framework for coordinating agents
Abstract. In open scenarios, agents willing to cooperate must impact the communication barrier between them and their unknown partners. If agents are not relying on any agreement a...
Maria Teresa Pazienza, Savino Sguera, Armando Stel...
AR
2008
143views more  AR 2008»
13 years 9 months ago
Toward Human-Like Real-Time Manipulation: From Perception to Motion Planning
Human-like behavior is crucial for intelligent service robots that are to perform versatile tasks in day to day life. In this paper, an integrated approach to human-like manipulat...
Sukhan Lee, Hadi Moradi, Daesik Jang, Han-Young Ja...