Sciweavers

1328 search results - page 114 / 266
» Common Knowledge
Sort
View
111
Voted
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
15 years 7 months ago
Opportunistic scheduling in cellular systems in the presence of non-cooperative mobiles
Abstract— A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention ...
Kavitha Veeraruna, Eitan Altman, Rachid El Azouzi,...
SP
2000
IEEE
15 years 6 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
102
Voted
FC
2010
Springer
132views Cryptology» more  FC 2010»
15 years 6 months ago
A Learning-Based Approach to Reactive Security
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
ECBS
2004
IEEE
84views Hardware» more  ECBS 2004»
15 years 6 months ago
A Methodology for Requirements Engineering Process Development
Adoption of the most suitable Requirements Engineering (RE) process and selection of the most appropriate RE techniques for a given project is a common challenge faced by industry...
Li Jiang, Armin Eberlein, Behrouz Homayoun Far
117
Voted
AIIDE
2008
15 years 4 months ago
Logical Agents for Language and Action
Game developers are faced with the difficult task of creating non-player characters with convincing behavior. This commonly involves an exhaustive specification of their actions i...
Martin Magnusson, Patrick Doherty