Sciweavers

4856 search results - page 969 / 972
» Concept formation in design
Sort
View
TMC
2011
1105views more  TMC 2011»
13 years 2 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
ATAL
2011
Springer
12 years 7 months ago
Using iterated reasoning to predict opponent strategies
The field of multiagent decision making is extending its tools from classical game theory by embracing reinforcement learning, statistical analysis, and opponent modeling. For ex...
Michael Wunder, Michael Kaisers, John Robert Yaros...
CEC
2011
IEEE
12 years 7 months ago
Cost-benefit analysis of using heuristics in ACGP
—Constrained Genetic Programming (CGP) is a method of searching the Genetic Programming search space non-uniformly, giving preferences to certain subspaces according to some heur...
John W. Aleshunas, Cezary Z. Janikow
DOCENG
2011
ACM
12 years 7 months ago
An exploratory analysis of mind maps
The results presented in this paper come from an exploratory study of 19,379 mind maps created by 11,179 users from the mind mapping applications ‘Docear’ and ‘MindMeister...
Jöran Beel, Stefan Langer
ICDCS
2011
IEEE
12 years 7 months ago
E-Shadow: Lubricating Social Interaction Using Mobile Phones
—In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow u...
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Do...