Sciweavers

2357 search results - page 465 / 472
» Computing Refactorings of Behavior Models
Sort
View
ICRA
2005
IEEE
146views Robotics» more  ICRA 2005»
14 years 26 days ago
Probabilistic Gaze Imitation and Saliency Learning in a Robotic Head
— Imitation is a powerful mechanism for transferring knowledge from an instructor to a na¨ıve observer, one that is deeply contingent on a state of shared attention between the...
Aaron P. Shon, David B. Grimes, Chris Baker, Matth...
INFOCOM
2005
IEEE
14 years 26 days ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
MOBICOM
2005
ACM
14 years 25 days ago
Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
Next generation fixed wireless broadband networks are being increasingly deployed as mesh networks in order to provide and extend access to the internet. These networks are chara...
Murali S. Kodialam, Thyaga Nandagopal
CCS
2005
ACM
14 years 25 days ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
LOCA
2005
Springer
14 years 23 days ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz