Sciweavers

1348 search results - page 11 / 270
» Keynote Address I
Sort
View
CSFW
2007
IEEE
14 years 1 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
INEX
2004
Springer
14 years 26 days ago
Narrowed Extended XPath I (NEXI)
INEX has through the years provided two types of queries: Content-Only queries (CO) and Content-And-Structure queries (CAS). The CO language has not changed much, but the CAS lang...
Andrew Trotman, Börkur Sigurbjörnsson
ATAL
2003
Springer
14 years 22 days ago
I am Autonomous, You are Autonomous
Autonomy is regarded as a crucial notion in multi-agent systems and several researchers have tried to identify what are the agent's parts that give it an autonomous character....
Hans Weigand, Virginia Dignum
ACMDIS
2000
ACM
13 years 12 months ago
Touch Me, Hit Me and I Know How You Feel: A Design Approach to Emotionally Rich Interaction
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
VTC
2010
IEEE
201views Communications» more  VTC 2010»
13 years 5 months ago
iTETRIS: Adaptation of ITS Technologies for Large Scale Integrated Simulation
1 —the European Union (EU) Framework Program 7 (FP7) funded project, iTETRIS [1] (An Integrated Wireless and Traffic Platform for Real-Time Road Traffic Management Solutions) tar...
Vineet Kumar, Lan Lin, Daniel Krajzewicz, Fatma Hr...