Sciweavers

9785 search results - page 1847 / 1957
» Open Agent Systems
Sort
View
120
Voted
CHI
2004
ACM
16 years 3 months ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith
111
Voted
ICSE
2004
IEEE-ACM
16 years 2 months ago
Verifying DAML+OIL and Beyond in Z/EVES
Semantic Web, the next generation of Web, gives data well-defined and machine-understandable meaning so that they can be processed by remote intelligent agents cooperatively. Onto...
Jin Song Dong, Chew Hung Lee, Yuan-Fang Li, Hai H....
111
Voted
IEEEARES
2010
IEEE
15 years 9 months ago
Secure Monitoring of Service Level Agreements
—Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement1 is an SLA specification that addresses the need of both ...
K. P. Clark, Martijn Warnier, Frances M. T. Brazie...
114
Voted
CHI
2010
ACM
15 years 9 months ago
Family story play: reading with young children (and elmo) over a distance
We introduce Family Story Play, a system that supports grandparents to read books together with their grandchildren over the Internet. Family Story Play is designed to improve com...
Hayes Raffle, Rafael Ballagas, Glenda Revelle, Hir...
150
Voted
PDP
2009
IEEE
15 years 9 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
« Prev « First page 1847 / 1957 Last » Next »