Sciweavers

578 search results - page 91 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
ENTCS
2008
153views more  ENTCS 2008»
13 years 9 months ago
Observable Behavior of Dynamic Systems: Component Reasoning for Concurrent Objects
Current object-oriented approaches to distributed programs may be criticized in several respects. First, method calls are generally synchronous, which leads to much waiting in dis...
Johan Dovland, Einar Broch Johnsen, Olaf Owe
AGENTS
1997
Springer
14 years 1 months ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso
CN
2006
74views more  CN 2006»
13 years 9 months ago
Measurement-based optimal routing on overlay architectures for unicast sessions
We propose a measurement-based routing algorithm to load-balance intradomain traffic along multiple paths for multiple unicast sources. Multiple paths are established using overla...
Tuna Güven, Richard J. La, Mark A. Shayman, B...
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 9 months ago
On Using Matching Theory to Understand P2P Network Design
This paper aims to provide insight into stability of collaboration choices in P2P networks. We study networks where exchanges between nodes are driven by the desire to receive the...
Dmitry Lebedev, Fabien Mathieu, Laurent Viennot, A...
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
14 years 9 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher