Sciweavers

8201 search results - page 1448 / 1641
» Approaching Manual Intelligence
Sort
View
CIDM
2007
IEEE
15 years 11 months ago
Privacy Preserving Burst Detection of Distributed Time Series Data Using Linear Transforms
— In this paper, we consider burst detection within the context of privacy. In our scenario, multiple parties want to detect a burst in aggregated time series data, but none of t...
Lisa Singh, Mehmet Sayal
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
15 years 11 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
AIIA
2007
Springer
15 years 11 months ago
A Hierarchical Clustering Procedure for Semantically Annotated Resources
Abstract. A clustering method is presented which can be applied to relational knowledge bases. It can be used to discover interesting groupings of resources through their (semantic...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
CIA
2007
Springer
15 years 11 months ago
Learning Initial Trust Among Interacting Agents
Trust learning is a crucial aspect of information exchange, negotiation, and any other kind of social interaction among autonomous agents in open systems. But most current probabil...
Achim Rettinger, Matthias Nickles, Volker Tresp
ECAL
2007
Springer
15 years 10 months ago
Multi-level Selection in the Emergence of Language Systematicity
Language can be viewed as a complex adaptive system which is continuously shaped and reshaped by the actions of its users as they try to solve communicative problems. To maintain c...
Luc Steels, Remi van Trijp, Pieter Wellens
« Prev « First page 1448 / 1641 Last » Next »