Sciweavers

674 search results - page 104 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
WISEC
2010
ACM
14 years 4 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
AAAI
2006
13 years 10 months ago
Decision Making in Uncertain Real-World Domains Using DT-Golog
DTGolog, a decision-theoretic agent programming language based on the situation calculus, was proposed to ease some of the computational difficulties associated with Markov Decisi...
Mikhail Soutchanski, Huy Pham, John Mylopoulos
IANDC
2008
115views more  IANDC 2008»
13 years 9 months ago
Fair multi-party contract signing using private contract signatures
A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a pre-agreed...
Aybek Mukhamedov, Mark Dermot Ryan
ESWS
2007
Springer
14 years 3 months ago
Media, Politics and the Semantic Web
The media play an important role in the functioning of our society. This role is extensively studied by Communication Scientists, requiring a systematic analysis of media content. ...
Wouter van Atteveldt, Stefan Schlobach, Frank van ...
ICRA
2003
IEEE
154views Robotics» more  ICRA 2003»
14 years 2 months ago
Scalability and schedulability in large, coordinated, distributed robot systems
— Multiple, independent robot platforms promise significant advantage with respect to robustness and flexibility. However, coordination between otherwise independent robots req...
John Sweeney, Huan Li, Roderic A. Grupen, Krithi R...