Sciweavers

7853 search results - page 197 / 1571
» Learning from Each Other
Sort
View
ICEBE
2006
IEEE
115views Business» more  ICEBE 2006»
14 years 4 months ago
From Commodity to Value: A Privacy-Preserving e-Business Architecture
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
Yitao Duan, John F. Canny
IATA
1998
Springer
14 years 2 months ago
From Interoperability to Cooperation: Building Intelligent Agents on Middleware
As agent technologies are increasingly being involved in telecommunication-related applications, the need for open standards is becoming critical. During the past years, different ...
Bruno Dillenseger
IASTEDSEA
2004
13 years 11 months ago
Deriving change architectures from RCS history
As software systems evolve over a series of releases, it becomes important to know which components show repeated need for maintenance. Deterioration of a single component manifes...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 8 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
FLAIRS
2004
13 years 11 months ago
Using Previous Experience for Learning Planning Control Knowledge
Machine learning (ML) is often used to obtain control knowledge to improve planning efficiency. Usually, ML techniques are used in isolation from experience that could be obtained...
Susana Fernández, Ricardo Aler, Daniel Borr...