Sciweavers

2261 search results - page 367 / 453
» Dynamic types for authentication
Sort
View
IJCAI
2001
13 years 10 months ago
Integrating Expectations from Different Sources to Help End Users Acquire Procedural Knowledge
Role-limiting approaches using explicit theories of problem-solving have been successful for acquiring knowledge from domain experts1 . However most systems using this approach do...
Jim Blythe
ECSCW
2003
13 years 10 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones
WICSA
2004
13 years 10 months ago
PACE: An Architectural Style for Trust Management in Decentralized Applications
Distributed applications that lack a central, trustworthy authority for control and validation are properly termed decentralized. Multiple, independent agencies, or "partners...
Girish Suryanarayana, Justin R. Erenkrantz, Scott ...
NAACL
2003
13 years 10 months ago
Factored Language Models and Generalized Parallel Backoff
We introduce factored language models (FLMs) and generalized parallel backoff (GPB). An FLM represents words as bundles of features (e.g., morphological classes, stems, data-drive...
Jeff Bilmes, Katrin Kirchhoff
NIPS
2003
13 years 10 months ago
Extending Q-Learning to General Adaptive Multi-Agent Systems
Recent multi-agent extensions of Q-Learning require knowledge of other agents’ payoffs and Q-functions, and assume game-theoretic play at all times by all other agents. This pap...
Gerald Tesauro