Sciweavers

1512 search results - page 272 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
CCS
2007
ACM
14 years 3 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
AAAI
1996
13 years 10 months ago
What Is Planning in the Presence of Sensing?
The Airport Example The Omelette Example Copyright c 1996 American Association for Artificial Intelligence. All rights reserved. Despite the existence of programs that are able to ...
Hector J. Levesque
ASSETS
2007
ACM
14 years 26 days ago
Variable frame rate for low power mobile sign language communication
The MobileASL project aims to increase accessibility by enabling Deaf people to communicate over video cell phones in their native language, American Sign Language (ASL). Real-tim...
Neva Cherniavsky, Anna Cavender, Richard E. Ladner...
CAISE
2004
Springer
14 years 2 months ago
Ontology for Characterising Architecture Frameworks
This paper outlines an ontology for characterising architecture frameworks. The ontology is based on the metamodel of MAF, and is currently being tried out on a set of well-known e...
Oddrun Pauline Ohren
DAGSTUHL
1996
13 years 10 months ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...