Sciweavers

732 search results - page 91 / 147
» What Is It Like to Be a Rat
Sort
View
AAMAS
2007
Springer
13 years 8 months ago
Modeling conversation policies using permissions and obligations
We describe our preliminary work in modeling conversation specifications and policies as positive/negative permissions and obligations. Our model is generic as it is independent o...
Lalana Kagal, Tim Finin
DEBU
2008
104views more  DEBU 2008»
13 years 7 months ago
Process Mining in Web Services: The WebSphere Case
Process mining has emerged as a way to discover or check the conformance of processes based on event logs. This enables organizations to learn from processes as they really take p...
Wil M. P. van der Aalst, H. M. W. (Eric) Verbeek
CGF
2006
132views more  CGF 2006»
13 years 7 months ago
Verification of Physically Based Rendering Algorithms
Within computer graphics, the field of predictive rendering is concerned with those methods of image synthesis which yield results that do not only look real, but are also radiome...
Christiane Ulbricht, Alexander Wilkie, Werner Purg...
IJRR
2006
89views more  IJRR 2006»
13 years 7 months ago
Time-optimal Trajectories for an Omni-directional Vehicle
A common mobile robot design consists of three `omniwheels' arranged at the vertices of an equilateral triangle, with wheel axles aligned with the rays from the center of the...
Devin J. Balkcom, Paritosh A. Kavathekar, Matthew ...
ECCC
2007
144views more  ECCC 2007»
13 years 7 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III