Sciweavers

2703 search results - page 505 / 541
» Learning operational requirements from goal models
Sort
View
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
IAAI
2001
13 years 10 months ago
Interchanging Agents and Humans in Military Simulation
The innovative reapplication of a multi-agent system for human-in-the-loop (HIL) simulation was a consequence of appropriate agent oriented design. The use of intelligent agents f...
Clinton Heinze, Simon Goss, Torgny Josefsson, Kerr...
ICDCS
2008
IEEE
14 years 3 months ago
Toward Predictive Failure Management for Distributed Stream Processing Systems
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is ess...
Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Sh...
SIGADA
2001
Springer
14 years 1 months ago
Electronic maneuvering board and dead reckoning tracer decision aid for the officer of the deck
Statement and AbstractProblem Statement and AbstractProblem Statement and AbstractProblem Statement and Abstract The U.S. Navy currently bases the majority of our contact managemen...
Kenneth L. Ehresman, Joey L. Frantzen
GLOBECOM
2009
IEEE
14 years 8 days ago
Conjectural Equilibrium in Water-Filling Games
—This paper considers a non-cooperative game in which competing users sharing a frequency-selective interference channel selfishly optimize their power allocation in order to imp...
Yi Su, Mihaela van der Schaar