Sciweavers

8620 search results - page 1614 / 1724
» Modeling the Human in Human Factors
Sort
View
KR
1992
Springer
14 years 2 months ago
Abductive Plan Recognition and Diagnosis: A Comprehensive Empirical Evaluation
While it has been realized for quite some time within AI that abduction is a general model of explanation for a variety of tasks, there have been no empirical investigations into ...
Hwee Tou Ng, Raymond J. Mooney
PODC
1990
ACM
14 years 2 months ago
Self-Stabilization of Dynamic Systems Assuming only Read/Write Atomicity
Three self-stabilizing protocols for distributed systems in the shared memory model are presented. The first protocol is a mutual exclusion protocol for tree structured systems. T...
Shlomi Dolev, Amos Israeli, Shlomo Moran
CIKM
2009
Springer
14 years 2 months ago
Terminology mining in social media
The highly variable and dynamic word usage in social media presents serious challenges for both research and those commercial applications that are geared towards blogs or other u...
Magnus Sahlgren, Jussi Karlgren
COMPLEX
2009
Springer
14 years 2 months ago
Using the Weighted Rich-Club Coefficient to Explore Traffic Organization in Mobility Networks
Abstract. The aim of a transportation system is to enable the movement of goods or persons between any two locations with the highest possible efficiency. This simple principle ins...
Jose J. Ramasco, Vittoria Colizza, Pietro Panzaras...
FC
2010
Springer
135views Cryptology» more  FC 2010»
14 years 2 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
« Prev « First page 1614 / 1724 Last » Next »