Sciweavers

557 search results - page 49 / 112
» Two experiences designing for effective security
Sort
View
MHCI
2005
Springer
14 years 2 months ago
Navigation control for mobile virtual environments
In this paper, we describe a project which uses PDAs to provide an interactive experience with a virtual environment. In particular, we focus on the navigational aspects of allowi...
Gary Marsden, Nicholas Tip
INLG
2010
Springer
13 years 6 months ago
Towards a Programmable Instrumented Generator
In this paper, we propose a general way of constructing an NLG system that permits the systematic exploration of the effects of particular system choices on output quality. We cal...
Chris Mellish
GLOBECOM
2007
IEEE
14 years 3 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 8 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
AGENTS
1999
Springer
14 years 1 months ago
General Principles of Learning-Based Multi-Agent Systems
We consider the problem of how to design large decentralized multiagent systems (MAS’s) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a...
David Wolpert, Kevin R. Wheeler, Kagan Tumer