Sciweavers

1540 search results - page 269 / 308
» Deceptive agents and language
Sort
View
ICALP
2003
Springer
14 years 1 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
IDEAL
2003
Springer
14 years 1 months ago
Towards a Terabyte Digital Library System
In China-US Million Book Digital Library, output of the digitalization process is more than one terabyte of text in OEB and PDF format. To access these data quickly and accurately,...
Hao Ding, Yun Lin, Bin Liu
IFIP
2003
Springer
14 years 1 months ago
Testing Mobile Wireless Applications
A framework is described that can be used to build and test application-level software for wireless mobile computing. It emulates the physical mobility of wireless devices by usin...
Ichiro Satoh
WETICE
2002
IEEE
14 years 25 days ago
Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working
The MObile Teamwork Infrastructure for Organizations Networking (MOTION) 1 service platform that we have designed and implemented addresses an emerging requirement in the daily bu...
Pascal Fenkam, Engin Kirda, Schahram Dustdar, Hara...
ICMCS
2000
IEEE
99views Multimedia» more  ICMCS 2000»
14 years 10 days ago
Automatic Selection of Visemes for Image-Based Visual Speech Synthesis
An image-based approach provides an efficient way for visual speech synthesis. In an image-based visual speech synthesis system, a few lip images, namely visemes, are used for ge...
Jie Yang, Jing Xiao, Max Ritter