Sciweavers

1151 search results - page 229 / 231
» A Requirements Negotiation Model Based on Multi-Criteria Ana...
Sort
View
ATAL
2007
Springer
13 years 11 months ago
Model-based belief merging without distance measures
Merging operators try to define the beliefs of a group of agents according to the beliefs of each member of the group. Several model-based propositional belief merging operators h...
Verónica Borja Macías, Pilar Pozos P...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
13 years 11 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
COLT
2008
Springer
13 years 9 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal
BIOCOMP
2006
13 years 9 months ago
Surgeon's Magic Wand: A Screen Pointing Interactive Method
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
Naren Vira, Shaleen Vira
ECIS
2004
13 years 9 months ago
Beyond Knowledge Management - Introducing a framework for Learning Management Systems
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...
Audrey Dunne, Tom Butler