Sciweavers

655 search results - page 78 / 131
» Naturalistic Decision Making for Power System Operators
Sort
View
SOSP
2003
ACM
16 years 10 days ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
139
Voted
ATAL
2010
Springer
15 years 4 months ago
Enumeration and exact design of weighted voting games
In many multiagent settings, situations arise in which agents must collectively make decisions while not every agent is supposed to have an equal amount of influence in the outcom...
Bart de Keijzer, Tomas Klos, Yingqian Zhang
ACL
2006
15 years 4 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...
LAWEB
2005
IEEE
15 years 9 months ago
Devices Descriptions for Context-Based Content Adaptation
Nowadays, networks can be accessed by multiple devices with different characteristics. Some of these characteristics such as low processing power and memory capacity restrict the ...
Robson Eisinger, Marcelo G. Manzato, Rudinei Goula...
140
Voted
SACMAT
2004
ACM
15 years 8 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...