Sciweavers

1663 search results - page 174 / 333
» Computer Security in the Real World
Sort
View
123
Voted
ATAL
2004
Springer
15 years 9 months ago
Demonstrating Social Error Recovery with AgentFactory
In real world applications, agents - be they software agents or autonomous robots - inevitably face erroneous situations that have not been planned for. Re-planning can sometimes ...
Robert J. Ross, Rem W. Collier, Gregory M. P. O'Ha...
MWCN
2004
Springer
15 years 9 months ago
The Receiver's Dilemma
In Mobile Ad Hoc Networks (MANETs), each node has the capacity to act as a router. The performance of the MANET relies on how well the nodes perform this function. In simulations,...
John P. Mullen, Timothy Matis, Smriti Rangan
111
Voted
ISWC
2003
IEEE
15 years 9 months ago
The Memory Glasses: Subliminal vs.Overt Memory Support with Imperfect Information
Wearables are frequently designed to support users engaged in complex “real world” activities, ranging from food inspection to ground combat. Unfortunately, wearables also hav...
Richard W. DeVaul, Alex Pentland, Vicka R. Corey
141
Voted
GCC
2003
Springer
15 years 9 months ago
CoAuto: A Formal Model for Cooperative Processes
A formal model called CoAuto (Cooperative Automaton) is proposed ibe and analyze cooperative processes. A basic CoAuto abstracts the behaviors of a single active entity. It separat...
Jinlei Jiang, Meilin Shi
144
Voted
LPKR
1997
Springer
15 years 8 months ago
DATALOG with Nested Rules
Abstract. This paper presents an extension of disjunctive datalog (Datalog∨ ) by nested rules. Nested rules are (disjunctive) rules where elements of the head may be also rules. ...
Sergio Greco, Nicola Leone, Francesco Scarcello