Sciweavers

2713 search results - page 200 / 543
» Designing Personal Tele-Embodiment
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
ATAL
2007
Springer
14 years 3 months ago
Estimating information value in collaborative multi-agent planning systems
This paper addresses the problem of identifying the value of information held by a teammate on a distributed, multi-agent team. It focuses on a distributed scheduling task in whic...
David Sarne, Barbara J. Grosz
ICCSA
2007
Springer
14 years 3 months ago
An Automatic Correction Tool for Relational Algebra Queries
Abstract. Relational algebra is one of the main topics covered in undergraduate computer science database courses. In this paper, we present a web-based tool designed to automatica...
Josep Soler, Imma Boada, Ferran Prados, Jordi Poch...
ICOIN
2007
Springer
14 years 3 months ago
Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network
Abstract. IEEE 802.15.4 is the Low-Rate Wireless Personal Area Network (LR-WPAN) standard that is suitable for wireless sensor networks and wireless home networks among others. The...
Sangki Yun, Hyogon Kim
ESCIENCE
2006
IEEE
14 years 3 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...