Sciweavers

784 search results - page 6 / 157
» An underlying model for defeat mechanisms
Sort
View
ICNP
2007
IEEE
14 years 1 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
ICAI
2009
13 years 5 months ago
The Utility of Affect in the Selection of Actions and Goals Under Real-World Constraints
We present a novel affective goal selection mechanism for decision-making in agents with limited computational resources (e.g., such as robots operating under real-time constraint...
Paul W. Schermerhorn, Matthias Scheutz
CDC
2010
IEEE
12 years 11 months ago
On the stability of wholesale electricity markets under real-time pricing
— The paper proposes a mathematical model for the dynamic evolution of supply, demand, and clearing prices under a class of real-time pricing mechanisms characterized by passing ...
Mardavij Roozbehani, Munther Dahleh, Sanjoy K. Mit...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 7 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
MICAI
2005
Springer
14 years 25 days ago
Modelling Human Intelligence: A Learning Mechanism
We propose a novel, high-level model of human learning and cognition, based on association forming. The model configures any input data stream featuring a high incidence of repeti...
Enrique Carlos Segura, Robin W. Whitty