Sciweavers

1056 search results - page 44 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Argument-based negotiation in a social context
Argumentation-based negotiation (ABN) provides agents with an effective means to resolve conflicts within a multi-agent society. However, to engage in such argumentative encounter...
Nishan C. Karunatillake, Nicholas R. Jennings, Iya...
BMCBI
2006
112views more  BMCBI 2006»
13 years 7 months ago
Argument-predicate distance as a filter for enhancing precision in extracting predications on the genetic etiology of disease
Background: Genomic functional information is valuable for biomedical research. However, such information frequently needs to be extracted from the scientific literature and struc...
Marco Masseroli, Halil Kilicoglu, François-...
ESORICS
2010
Springer
13 years 5 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
PERCOM
2006
ACM
14 years 7 months ago
Unearthing Design Patterns to Support Context-Awareness
The lack of structured methodologies and software engineering efforts on designing the support of contextawareness in pervasive systems hinders the potential advantages of analyzi...
Oriana Riva, Cristiano di Flora, Stefano Russo, Ki...
ER
2009
Springer
166views Database» more  ER 2009»
14 years 2 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone