Sciweavers

2780 search results - page 528 / 556
» Agents in Proactive Environments
Sort
View
WSC
2007
14 years 17 days ago
Self organized UAV swarm planning optimization for search and destroy using SWARMFARE simulation
As military interest continues to grow for Unmanned Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous control, mission planning and optimization techniq...
Dustin J. Nowak, Ian C. Price, Gary B. Lamont
ACMACE
2008
ACM
14 years 8 days ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång
AIMSA
2008
Springer
14 years 8 days ago
DynABT: Dynamic Asynchronous Backtracking for Dynamic DisCSPs
Abstract. Constraint Satisfaction has been widely used to model static combinatorial problems. However, many AI problems are dynamic and take place in a distributed environment, i....
Bayo Omomowo, Inés Arana, Hatem Ahriz
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 7 days ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
DMIN
2007
183views Data Mining» more  DMIN 2007»
13 years 11 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher