Sciweavers

188 search results - page 12 / 38
» Finding Best k Policies
Sort
View
AWIC
2003
Springer
14 years 3 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 4 months ago
Tendering Process Model (TPM) Implementation for B2B Integration in a Web Services Environment
Improvements can be made for tendering processes to solve B2B interoperability and integration problem by means of Web services technology. In this paper, we detail our tendering ...
Lick Lun Nick Ng, Dickson K. W. Chiu, Patrick C. K...
POS
2000
Springer
14 years 1 months ago
The Memory Behavior of the WWW, or The WWW Considered as a Persistent Store
Abstract. This paper presents the performance evaluation of five memory allocation strategies for the PerDiS Persistent Distributed Object store in the context of allocating two di...
Nicolas Richer, Marc Shapiro
WCNC
2010
IEEE
14 years 1 months ago
Dynamic Control of Data Ferries under Partial Observations
—Controlled mobile helper nodes called data ferries have recently been proposed to bridge communications between disconnected nodes in a delay-tolerant manner. While existing wor...
Chi Harold Liu, Ting He, Kang-won Lee, Kin K. Leun...
TSP
2010
13 years 4 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao