Sciweavers

1663 search results - page 135 / 333
» Privacy and Identity Management
Sort
View
ESAW
2009
Springer
15 years 11 months ago
Knowledge Management in Role Based Agents
In multi-agent system literature, the role concept is getting ngly researched to provide an abstraction to scope beliefs, norms, goals of agents and to shape relationships of the a...
Hüseyin Kir, Erdem Eser Ekinci, Oguz Dikenell...
AINA
2007
IEEE
15 years 11 months ago
Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...
Bin Guo, Michita Imai
IPCO
2004
107views Optimization» more  IPCO 2004»
15 years 6 months ago
A Robust Optimization Approach to Supply Chain Management
Abstract. We propose a general methodology based on robust optimization to address the problem of optimally controlling a supply chain subject to stochastic demand in discrete time...
Dimitris Bertsimas, Aurélie Thiele
ISI
2004
Springer
15 years 10 months ago
Identifying Multi-ID Users in Open Forums
We describe a model for real-time communication exchange in public forums, such as newsgroups and chatrooms, and use this model to develop an efficient algorithm which identifies...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
JAISE
2011
243views more  JAISE 2011»
14 years 11 months ago
Safeguards in a world of ambient intelligence: A social, economic, legal, and ethical perspective
The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, priv...
Egon L. van den Broek