Sciweavers

719 search results - page 29 / 144
» What HMMs Can Do
Sort
View
ICDCIT
2005
Springer
14 years 4 months ago
Cleaning an Arbitrary Regular Network with Mobile Agents
In this paper, we consider a contaminated network with an intruder. The task for the mobile agents is to decontaminate all hosts while preventing a recontamination and to do so as ...
Paola Flocchini, Amiya Nayak, Arno Schulz
ESOP
2005
Springer
14 years 4 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
CHI
2003
ACM
14 years 11 months ago
Ethnographic interviews guide design of ford vehicles website
This case study describes ethnographic interviews with vehicle buyers to learn how they make purchase decisions. The research was conducted for J. Walter Thompson (JWT), the digit...
Lori Anschuetz, Stephanie Rosenbaum
ARGMAS
2008
Springer
14 years 29 days ago
Co-ordination and Co-operation in Agent Systems: Social Laws and Argumentation
The social laws paradigm represents an important approach to the co-ordination of behaviour in multi-agent systems. In this paper we examine the relationship between social laws an...
Katie Atkinson, Trevor J. M. Bench-Capon
ICMI
2003
Springer
166views Biometrics» more  ICMI 2003»
14 years 4 months ago
Georgia tech gesture toolkit: supporting experiments in gesture recognition
Gesture recognition is becoming a more common interaction tool in the fields of ubiquitous and wearable computing. Designing a system to perform gesture recognition, however, can...
Tracy L. Westeyn, Helene Brashear, Amin Atrash, Th...