Sciweavers

8624 search results - page 1698 / 1725
» Designing example-critiquing interaction
Sort
View
ASIACRYPT
2008
Springer
14 years 2 days ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ASSETS
2008
ACM
14 years 2 days ago
What's new?: making web page updates accessible
Web applications facilitated by technologies such as JavaScript, DHTML, AJAX, and Flash use a considerable amount of dynamic web content that is either inaccessible or unusable by...
Yevgen Borodin, Jeffrey P. Bigham, Rohit Raman, I....
ATAL
2008
Springer
14 years 2 days ago
MADeM: a multi-modal decision making for social MAS
This paper presents MADeM, a multi-modal agent decision making to provide virtual agents with socially acceptable decisions. We consider multi-modal decisions as those that are ab...
Francisco Grimaldo, Miguel Lozano, Fernando Barber
ATAL
2008
Springer
14 years 2 days ago
A statistical relational model for trust learning
We address the learning of trust based on past observations and context information. We argue that from the truster's point of view trust is best expressed as one of several ...
Achim Rettinger, Matthias Nickles, Volker Tresp
ATAL
2008
Springer
14 years 2 days ago
Distributed multiagent resource allocation in diminishing marginal return domains
We consider a multiagent resource allocation domain where the marginal production of each resource is diminishing. A set of identical, self-interested agents requires access to sh...
Yoram Bachrach, Jeffrey S. Rosenschein
« Prev « First page 1698 / 1725 Last » Next »