Sciweavers

263 search results - page 49 / 53
» System design methodologies for a wireless security processi...
Sort
View
EDBTW
2010
Springer
13 years 10 months ago
An architecture for ad-hoc and collaborative business intelligence
The success of organizations or business networks depends on fast and well-founded decisions taken by the relevant people in their specific area of responsibility. To enable time...
Henrike Berthold, Philipp Rösch, Stefan Z&oum...
COMCOM
2000
125views more  COMCOM 2000»
13 years 7 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
SENSYS
2005
ACM
14 years 29 days ago
Sensor networks for medical care
Sensor networks have the potential to greatly impact many aspects of medical care. By outfitting patients with wireless, wearable vital sign sensors, collecting detailed real-tim...
Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Th...
AGENTS
1998
Springer
13 years 11 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
ATAL
2005
Springer
14 years 29 days ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards