Sciweavers

1342 search results - page 173 / 269
» Shape reasoning and understanding
Sort
View
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 3 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
IVA
2009
Springer
14 years 3 months ago
A Study into Preferred Explanations of Virtual Agent Behavior
Virtual training systems provide an effective means to train people for complex, dynamic tasks such as crisis management or firefighting. Intelligent agents are often used to pl...
Maaike Harbers, Karel van den Bosch, John-Jules Ch...
LPNMR
2009
Springer
14 years 3 months ago
Translating Preferred Answer Set Programs to Propositional Logic
Abstract. We consider the problem of whether a given preferred answer set program can be reduced to a propositional formula. Research on this topic is of both theoretical and pract...
Vernon Asuncion, Yan Zhang
MATES
2009
Springer
14 years 3 months ago
Agent-Based Semantic Search at motoso.de
Abstract. Searching for information in large rather unstructured realworld data sets is a dicult task, because the user expects immediate responses as well as high-quality search ...
Nils Weber, Lars Braubach, Alexander Pokahr, Winfr...
MHCI
2009
Springer
14 years 3 months ago
Mobile phone web browsing: a study on usage and usability of the mobile web
Browsing the Web on mobile phones has finally hit the mass. The visualization of websites on latest mobile phone models comes close to what we are used from desktop computers. Tai...
Grischa Schmiedl, Markus Seidl, Klaus Temper