Sciweavers

443 search results - page 82 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
ACMICEC
2006
ACM
213views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
CMieux: adaptive strategies for competitive supply chain trading
Supply chains are a central element of today’s global economy. Existing management practices consist primarily of static interactions between established partners. Global compet...
Michael Benisch, Alberto Sardinha, James Andrews, ...
ATAL
2010
Springer
13 years 9 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
ML
2010
ACM
142views Machine Learning» more  ML 2010»
13 years 6 months ago
Fast adaptive algorithms for abrupt change detection
We propose two fast algorithms for abrupt change detection in streaming data that can operate on arbitrary unknown data distributions before and after the change. The first algor...
Daniel Nikovski, Ankur Jain
ECOOPWEXCEPTION
2006
Springer
13 years 12 months ago
Exception Handling and Asynchronous Active Objects: Issues and Proposal
Asynchronous Active Objects (AAOs), primarily exemplied by actors [1], nowadays exist in many forms (various kinds of actors, agents and components) and are more and more used beca...
Christophe Dony, Christelle Urtado, Sylvain Vautti...
CODES
2009
IEEE
13 years 11 months ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross