Sciweavers

1307 search results - page 201 / 262
» Conceptual models: begin by designing what to design
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
AMAST
2004
Springer
13 years 11 months ago
Deductive Verification of Distributed Groupware Systems
Distributed groupware systems consist of a group of users manipulating a shared object (like a text document, a filesystem, etc). Operational Transformation (OT) algorithms are app...
Abdessamad Imine, Pascal Molli, Gérald Oste...
AGI
2008
13 years 9 months ago
Artificial general intelligence: an organism and level based position statement
Abstract. Do simple animals, even single-celled animals, display general intelligence? If we take this to mean that they can cope with their environment, even when it is dynamic, t...
Leslie S. Smith
AIR
2005
97views more  AIR 2005»
13 years 7 months ago
Explanation in Case-Based Reasoning-Perspectives and Goals
Abstract. We present an overview of different theories of explanation from the philosophy and cognitive science communities. Based on these theories, as well as models of explanati...
Frode Sørmo, Jörg Cassens, Agnar Aamod...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 7 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...