Sciweavers

3864 search results - page 649 / 773
» time 2005
Sort
View
ATAL
2005
Springer
15 years 9 months ago
Reasoning about joint beliefs for execution-time communication decisions
Just as POMDPs have been used to reason explicitly about uncertainty in single-agent systems, there has been recent interest in using multi-agent POMDPs to coordinate teams of age...
Maayan Roth, Reid G. Simmons, Manuela M. Veloso
CCS
2005
ACM
15 years 9 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
CEAS
2005
Springer
15 years 9 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 9 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
MIDDLEWARE
2005
Springer
15 years 9 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...