Sciweavers

4142 search results - page 211 / 829
» Trusting an Information Agent
Sort
View
MMMACNS
2005
Springer
15 years 10 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
FLAIRS
2007
15 years 6 months ago
Explaining Task Processing in Cognitive Assistants that Learn
As personal assistant software matures and assumes more autonomous control of its users’ activities, it becomes more critical that this software can explain its task processing....
Deborah L. McGuinness, Alyssa Glass, Michael Wolve...
ICS
2003
Tsinghua U.
15 years 9 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CSCW
2010
ACM
15 years 11 months ago
Receptionist or information kiosk: how do people talk with a robot?
The schema or mental structures that people apply towards other people has been shown to influence the way people cooperate with others. Schemas evoke behavioral scripts. In this ...
Min Kyung Lee, Sara B. Kiesler, Jodi Forlizzi
CIA
2007
Springer
15 years 10 months ago
Quantifying the Expected Utility of Information in Multi-agent Scheduling Tasks
Abstract. In this paper we investigate methods for analyzing the expected value of adding information in distributed task scheduling problems. As scheduling problems are NP-complet...
Avi Rosenfeld, Sarit Kraus, Charlie Ortiz