Sciweavers

1834 search results - page 250 / 367
» Public Key Cryptography
Sort
View
ENTCS
2006
181views more  ENTCS 2006»
13 years 8 months ago
Conditional Doxastic Models: A Qualitative Approach to Dynamic Belief Revision
In this paper, we present a semantical approach to multi-agent belief revision and belief update. For this, we introduce relational structures called conditional doxastic models (...
Alexandru Baltag, Sonja Smets
CE
2007
102views more  CE 2007»
13 years 8 months ago
ICT and learning: Lessons from Australian classrooms
Research into Information and Communication Technologies (ICT) in schools is well into its third decade but there is still a pressing need to better understand how computer-based ...
Debra N. A. Hayes
JLP
2007
114views more  JLP 2007»
13 years 7 months ago
Deaccumulation techniques for improving provability
Several induction theorem provers were developed to verify functional programs mechanically. Unfortunately, automatic verification often fails for functions with accumulating arg...
Jürgen Giesl, Armin Kühnemann, Janis Voi...
JUCS
2010
98views more  JUCS 2010»
13 years 6 months ago
Mobile Agent-based Context-aware Services
: This paper presents an agent-based system for building and operating agent-based context-aware services in public spaces, including museums. The system provides users with agents...
Ichiro Satoh
MATES
2010
Springer
13 years 6 months ago
Impact of Competition on Quality of Service in Demand Responsive Transit
Abstract. Demand responsive transportation has the potential to provide efficient public door-to-door transport with a high quality. In currently implemented systems in the Netherl...
Ferdi Grootenboers, Mathijs de Weerdt, Mahdi Zarga...