Sciweavers

1166 search results - page 184 / 234
» Negotiating Using Rewards
Sort
View
MINENET
2005
ACM
14 years 3 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
PCI
2005
Springer
14 years 3 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...
CSCW
2004
ACM
14 years 3 months ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang
ITS
2004
Springer
119views Multimedia» more  ITS 2004»
14 years 3 months ago
The Social Role of Technical Personnel in the Deployment of Intelligent Tutoring Systems
Most of the prior descriptions of the important relationships in Intelligent Tutoring System (ITS) projects have focused on the relationships involved in their use in classrooms, ...
Ryan Shaun Baker, Angela Z. Wagner, Albert T. Corb...
PODC
2003
ACM
14 years 3 months ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh