Sciweavers

1180 search results - page 186 / 236
» Interaction Protocols in Agentis
Sort
View
IWC
2007
121views more  IWC 2007»
15 years 4 months ago
Eye movements as indices for the utility of life-like interface agents: A pilot study
We motivate an approach to evaluating the utility of life-like interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obta...
Helmut Prendinger, Chunling Ma, Mitsuru Ishizuka
ICIP
2009
IEEE
16 years 5 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
SIGMOD
2008
ACM
190views Database» more  SIGMOD 2008»
16 years 4 months ago
XRPC: distributed XQuery and update processing with heterogeneous XQuery engines
We demonstrate XRPC, a minimal XQuery extension that enables distributed querying between heterogeneous XQuery engines. The XRPC language extension enhances the existing concept o...
Ying Zhang, Peter A. Boncz
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 11 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 11 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...