Sciweavers

3155 search results - page 546 / 631
» How Are You Doing
Sort
View
NTMS
2009
IEEE
14 years 3 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
ATAL
2009
Springer
14 years 3 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...
ATAL
2009
Springer
14 years 3 months ago
Monitoring social expectations in Second Life
Online virtual worlds such as Second Life provide a rich medium for unstructured human interaction in a shared simulated 3D environment. However, many human interactions take place...
Stephen Cranefield, Guannan Li
CIKM
2009
Springer
14 years 3 months ago
Evaluating top-k queries over incomplete data streams
We study the problem of continuous monitoring of top-k queries over multiple non-synchronized streams. Assuming a sliding window model, this general problem has been a well addres...
Parisa Haghani, Sebastian Michel, Karl Aberer
COSIT
2009
Springer
116views GIS» more  COSIT 2009»
14 years 3 months ago
The Endpoint Hypothesis: A Topological-Cognitive Assessment of Geographic Scale Movement Patterns
Movement patterns of individual entities at the geographic scale are becoming a prominent research focus in spatial sciences. One pertinent question is how cognitive and formal cha...
Alexander Klippel, Rui Li