Sciweavers

964 search results - page 10 / 193
» On Securely Scheduling a Meeting
Sort
View
WISA
2009
Springer
14 years 4 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
AAAI
1994
13 years 11 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
PATAT
2004
Springer
130views Education» more  PATAT 2004»
14 years 3 months ago
Learning User Preferences in Distributed Calendar Scheduling
Abstract. Within the field of software agents, there has been increasing interest in automating the process of calendar scheduling in recent years. Calendar (or meeting) schedulin...
Jean Oh, Stephen F. Smith
SACMAT
2009
ACM
14 years 4 months ago
Usability meets access control: challenges and research opportunities
This panel discusses specific challenges in the usability of access control technologies and new opportunities for research. The questions vary from “Why nobody, even experts, ...
Konstantin Beznosov, Philip Inglesant, Jorge Lobo,...
CORR
2010
Springer
85views Education» more  CORR 2010»
13 years 10 months ago
A control-theoretical methodology for the scheduling problem
This paper presents a novel methodology to develop scheduling algorithms. The scheduling problem is phrased as a control problem, and control-theoretical techniques are used to de...
Carlo A. Furia, Alberto Leva, Martina Maggio, Paol...