Sciweavers

596 search results - page 7 / 120
» Theories of Access Consciousness
Sort
View
MMS
2006
13 years 7 months ago
Forms and theories of communication: from multimedia to Kansei Mediation
Abstract In this paper we describe a form of communication that could be used for lifelong learning as contribution to cultural computing. We call it Kansei Mediation. It is a mult...
Ryohei Nakatsu, Matthias Rauterberg, Ben Salem
PIMRC
2008
IEEE
14 years 1 months ago
Information theory vs. queueing theory for resource allocation in multiple access channels
— We consider the problem of rate allocation in a fading Gaussian multiple-access channel with fixed transmission powers. The goal is to maximize a general concave utility funct...
Ali ParandehGheibi, Muriel Médard, Asuman E...
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 1 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
AAAI
1998
13 years 8 months ago
Metacognition in Software Agents Using Classifier Systems
Software agents "living" and acting in a real world software environment, such as an operating system, a network, or a database system, can carry out many tasks for huma...
Zhaohua Zhang, Stan Franklin, Dipankar Dasgupta
ICALP
2007
Springer
14 years 1 months ago
A "proof-reading" of Some Issues in Cryptography
Abstract. In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over ...
Ivan Damgård