Sciweavers

2034 search results - page 334 / 407
» Declarative Agent Control
Sort
View
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 11 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
SASO
2009
IEEE
14 years 5 months ago
Self-organizing Bandwidth Sharing in Priority-Based Medium Access
In this paper, we present an analysis of self-organizing bandwidth sharing in priority-based medium access. For this purpose, the priority-based Access Game is introduced. Analysi...
Stefan Wildermann, Tobias Ziermann, Jürgen Te...
IAT
2008
IEEE
14 years 4 months ago
Generating Personalized Summaries Using Publicly Available Web Documents
Many Knowledge workers are increasingly using online resources to find out latest developments in their specialty and articles of interest. To extract relevant information from s...
Chandan Kumar, Prasad Pingali, Vasudeva Varma
IROS
2008
IEEE
125views Robotics» more  IROS 2008»
14 years 4 months ago
Dynamic correlation matrix based multi-Q learning for a multi-robot system
—Multi-robot reinforcement learning is a very challenging area due to several issues, such as large state spaces, difficulty in reward assignment, nondeterministic action selecti...
Hongliang Guo, Yan Meng
SASO
2008
IEEE
14 years 4 months ago
An Infection-Based Mechanism for Self-Adaptation in Multi-agent Complex Networks
Distributed mechanisms that regulate the behavior of autonomous agents in open multi-agent systems (MAS) are of high interest since we cannot employ centralized approaches relying...
Norman Salazar, Juan A. Rodríguez-Aguilar, ...