Sciweavers

304 search results - page 13 / 61
» Trusted Computing in Mobile Action
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
ROBIO
2006
IEEE
121views Robotics» more  ROBIO 2006»
14 years 1 months ago
Behaviour Cooperation by Negation for Mobile Robots
— This article presents a behavioural architecture, the Survival Kit (SK), which allows behaviours to cast their multivalued output by means of constraints over an ’action feat...
Pedro Santana, Luís Correia
CHI
2007
ACM
14 years 8 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara
ECWEB
2011
Springer
277views ECommerce» more  ECWEB 2011»
12 years 7 months ago
Trust-Based Selection of Partners
The community of multi-agent systems has been studying ways to improve the selection of partner agents for joint action. One of such approaches consists in estimating the trustwort...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...