Sciweavers

192 search results - page 5 / 39
» An autonomous explore exploit strategy
Sort
View
CN
2008
128views more  CN 2008»
13 years 7 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ACMICEC
2005
ACM
160views ECommerce» more  ACMICEC 2005»
14 years 1 months ago
Autonomous trading agent design in the presence of tradeoffs
In previous work we have introduced a principled methodology for systematically exploring the space of bidding strategies when agents participate in a significant number of simul...
Ioannis A. Vetsikas, Bart Selman
PERCOM
2005
ACM
14 years 7 months ago
Spray computers: Explorations in self-organization
We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic a...
Franco Zambonelli, Marie Pierre Gleizes, Marco Mam...
ALIFE
2002
13 years 7 months ago
Bioinspired Engineering of Exploration Systems for NASA and DoD
A new approach called bioinspired engineering of exploration systems (BEES) and its value for solving pressing NASA and DoD needs are described. Insects (for example honeybees and ...
Sarita Thakoor, Javaan S. Chahl, Mandyam V. Sriniv...
ATAL
2008
Springer
13 years 9 months ago
MB-AIM-FSI: a model based framework for exploiting gradient ascent multiagent learners in strategic interactions
Future agent applications will increasingly represent human users autonomously or semi-autonomously in strategic interactions with similar entities. Hence, there is a growing need...
Doran Chakraborty, Sandip Sen