Sciweavers

1527 search results - page 289 / 306
» What About Wednesday
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
SOUPS
2010
ACM
13 years 11 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
AI50
2006
13 years 11 months ago
The Physical Symbol System Hypothesis: Status and Prospects
I analyze some of the attacks against the Physical Symbol System Hypothesis--attacks based on the presumed need for symbolgrounding and non-symbolic processing for intelligent beha...
Nils J. Nilsson
AINA
2006
IEEE
13 years 11 months ago
EQ-BGP: an efficient inter-domain QoS routing protocol
In this paper we propose the Enhanced QoS Border Gateway Protocol1 (EQ-BGP) aimed at performing the inter-domain QoS routing in a multi-domain IP network. The objective of EQ-BGP ...
Andrzej Beben
ATAL
2006
Springer
13 years 11 months ago
Integrating agent-oriented methodologies with UML-AT
There are many methodological approaches for Agent-Oriented Software Engineering, each one focusing on some features of multi-agent systems, but leaving others underdefined. For t...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...