Sciweavers

41938 search results - page 8250 / 8388
» Complex Systems Modeling
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 10 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
AI
2004
Springer
13 years 10 months ago
Order-sorted logic programming with predicate hierarchy
Order-sorted logic has been formalized as first-order logic with sorted terms where sorts are ordered to build a hierarchy (called a sort-hierarchy). These sorted logics lead to u...
Ken Kaneiwa
AIR
2004
113views more  AIR 2004»
13 years 10 months ago
Class Noise vs. Attribute Noise: A Quantitative Study
Real-world data is never perfect and can often suffer from corruptions (noise) that may impact interpretations of the data, models created from the data and decisions made based on...
Xingquan Zhu, Xindong Wu
VR
2008
IEEE
202views Virtual Reality» more  VR 2008»
13 years 10 months ago
FARMTASIA: an online game-based learning environment based on the VISOLE pedagogy
Virtual interactive student-oriented learning environment (VISOLE) is a game-based constructivist pedagogical approach that encompasses the creation of an online interactive world ...
Kevin K. F. Cheung, Morris Siu Yung Jong, Fong Lok...
AI
2002
Springer
13 years 10 months ago
Using similarity criteria to make issue trade-offs in automated negotiations
Automated negotiation is a key form of interaction in systems that are composed of multiple autonomous agents. The aim of such interactions is to reach agreements through an itera...
Peyman Faratin, Carles Sierra, Nicholas R. Jenning...
« Prev « First page 8250 / 8388 Last » Next »