Sciweavers

193 search results - page 30 / 39
» Modelling Assumptions and Requirements in the Context of Pro...
Sort
View
JCDL
2009
ACM
102views Education» more  JCDL 2009»
14 years 3 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson
OTM
2007
Springer
14 years 2 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
AIPS
2000
13 years 10 months ago
Challenges and Methods in Testing the Remote Agent Planner
The Remote Agent Experiment (RAX) on the Deep Space 1 (DS1) mission was the first time that an artificially intelligent agent controlled a NASA spacecraft. One of the key componen...
Benjamin D. Smith, Martin S. Feather, Nicola Musce...
FDG
2009
ACM
14 years 3 months ago
System for Automated Interactive Lighting (SAIL)
Successful lighting in video games is more than a physically accurate illumination model. Aesthetics and function are of equal or greater importance. Lighting designers may deviat...
Joseph A. Zupko, Magy Seif El-Nasr
IAT
2007
IEEE
14 years 2 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...