Sciweavers

762 search results - page 145 / 153
» Behavioural Models for Group Communications
Sort
View
RAS
2008
108views more  RAS 2008»
13 years 8 months ago
Towards long-lived robot genes
Robot projects are often evolutionary dead ends, with the software and hardware they produce disappearing without trace afterwards. Common causes include dependencies on uncommon ...
Paul M. Fitzpatrick, Giorgio Metta, Lorenzo Natale
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 7 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
GLOBECOM
2010
IEEE
13 years 6 months ago
A Controlled Coalitional Game for Wireless Connection Sharing and Bandwidth Allocation in Mobile Social Networks
Mobile social networks have been introduced as a new efficient (i.e., minimize resource usage) and effective (i.e., maximize the number of target recipients) way to disseminate con...
Dusit Niyato, Zhu Han, Walid Saad, Are Hjør...
WWW
2003
ACM
14 years 10 months ago
A Unified Abstraction for Messaging on the Semantic Web
d Abstraction for Messaging on the Semantic Web Dennis Quan IBM Internet Technology 1 Rogers Street Cambridge, MA 02142 USA dennisq@us.ibm.com Karun Bakshi MIT Artificial Intellige...
Dennis Quan, Karun Bakshi, David R. Karger
EDBT
2006
ACM
179views Database» more  EDBT 2006»
14 years 9 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu