Sciweavers

1352 search results - page 118 / 271
» Designing Security Requirements Models Through Planning
Sort
View
165
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 5 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
143
Voted
WINET
2002
98views more  WINET 2002»
15 years 3 months ago
A Unified Architecture for the Design and Evaluation of Wireless Fair Queueing Algorithms
Abstract. Fair queueing in the wireless domain poses significant challenges due to unique issues in the wireless channel such as locationdependent and bursty channel errors. In thi...
Thyagarajan Nandagopal, Songwu Lu, Vaduvur Bhargha...
IJCAI
2003
15 years 4 months ago
Writer's Aid: Using a Planner in a Collaborative Interface
Writer’s Aid is a collaborative system that works simultaneously with an author editing a document providing assistance in identifying and inserting citation keys and autonomous...
Tamara Babaian, Barbara J. Grosz, Stuart M. Shiebe...
128
Voted
ECAI
2004
Springer
15 years 8 months ago
The KGP Model of Agency
This paper presents a new model of agency, called the KGP (Knowledge, Goals and Plan) model. This draws from the classic BDI model and proposes a hierarchical agent architecture wi...
Antonis C. Kakas, Paolo Mancarella, Fariba Sadri, ...
126
Voted
FDG
2009
ACM
15 years 10 months ago
Evaluation of intelligent camera control systems based on cognitive models of comprehension
We propose a novel evaluation methodology for intelligent camera control systems based on established techniques of measuring story comprehension from cognitive psychology. The pr...
Arnav Jhala, R. Michael Young