Sciweavers

1352 search results - page 118 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 17 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
WINET
2002
98views more  WINET 2002»
13 years 9 months ago
A Unified Architecture for the Design and Evaluation of Wireless Fair Queueing Algorithms
Abstract. Fair queueing in the wireless domain poses significant challenges due to unique issues in the wireless channel such as locationdependent and bursty channel errors. In thi...
Thyagarajan Nandagopal, Songwu Lu, Vaduvur Bhargha...
IJCAI
2003
13 years 11 months ago
Writer's Aid: Using a Planner in a Collaborative Interface
Writer’s Aid is a collaborative system that works simultaneously with an author editing a document providing assistance in identifying and inserting citation keys and autonomous...
Tamara Babaian, Barbara J. Grosz, Stuart M. Shiebe...
ECAI
2004
Springer
14 years 3 months ago
The KGP Model of Agency
This paper presents a new model of agency, called the KGP (Knowledge, Goals and Plan) model. This draws from the classic BDI model and proposes a hierarchical agent architecture wi...
Antonis C. Kakas, Paolo Mancarella, Fariba Sadri, ...
FDG
2009
ACM
14 years 4 months ago
Evaluation of intelligent camera control systems based on cognitive models of comprehension
We propose a novel evaluation methodology for intelligent camera control systems based on established techniques of measuring story comprehension from cognitive psychology. The pr...
Arnav Jhala, R. Michael Young