Sciweavers

907 search results - page 156 / 182
» Understanding movement for interaction design: frameworks an...
Sort
View
AAAI
2006
13 years 10 months ago
Analysis of Privacy Loss in Distributed Constraint Optimization
Distributed Constraint Optimization (DCOP) is rapidly emerging as a prominent technique for multiagent coordination. However, despite agent privacy being a key motivation for appl...
Rachel Greenstadt, Jonathan P. Pearce, Milind Tamb...
DKE
2008
208views more  DKE 2008»
13 years 8 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
NETWORK
2008
94views more  NETWORK 2008»
13 years 8 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
ASE
2005
140views more  ASE 2005»
13 years 8 months ago
Aspect-Capable Call Path Profiling of Multi-Threaded Java Applications
A primary goal of program performance understanding tools is to focus the user's attention directly on optimization opportunities where significant cost savings may be found....
Robert J. Hall
IJHCI
2010
144views more  IJHCI 2010»
13 years 7 months ago
Naturalistic Decision Making for Power System Operators
Motivation – Investigations of large-scale outages in the North American interconnected electric system often attribute the causes to three T’s: Trees, Training and Tools. To ...
Frank L. Greitzer, Robin Podmore, Marck Robinson, ...