Sciweavers

2645 search results - page 380 / 529
» Autonomous security for autonomous systems
Sort
View
196
Voted
ENTCS
2006
1305views more  ENTCS 2006»
15 years 4 months ago
Communication Attitudes: A Formal Approach to Ostensible Intentions, and Individual and Group Opinions
Conventional approaches to the modeling of autonomous agents and agent communication rely heavily on the ascription of mental properties like beliefs and intentions to the individ...
Matthias Nickles, Felix A. Fischer, Gerhard Wei&sz...
CONCURRENCY
2000
123views more  CONCURRENCY 2000»
15 years 4 months ago
A mobile agent based push methodology for global parallel computing
The 1990s are seeing the explosive growth of the Internet and Web-based information sharing and dissemination systems. The Internet is also showing a potential of forming of a sup...
Cheng-Zhong Xu, Brian Wims
IBMSJ
2000
89views more  IBMSJ 2000»
15 years 4 months ago
Design and implementation of expressive footwear
As an outgrowth of our interest in dense wireless sensing and expressive applications of wearable computing, we have developed the world's most versatile human-computer inter...
Joseph A. Paradiso, Kai-yuh Hsiao, Ari Y. Benbasat...
158
Voted
ATAL
2011
Springer
14 years 4 months ago
Incentive design for adaptive agents
We consider a setting in which a principal seeks to induce an adaptive agent to select a target action by providing incentives on one or more actions. The agent maintains a belief...
Yiling Chen, Jerry Kung, David C. Parkes, Ariel D....
ADHOCNETS
2009
Springer
15 years 11 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun