Sciweavers

256 search results - page 29 / 52
» From Physical Agents to Recommender Agents
Sort
View
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot
AAAI
1992
14 years 3 days ago
Analyzing Failure Recovery to Improve Planner Design
Plans fail for many reasons. During planner development, failure can often be traced to actions of the planner itself. Failure recovery analysis is a procedure for analyzing execu...
Adele E. Howe
CIA
2003
Springer
14 years 4 months ago
A Framework for the Social Description of Resources in Open Environments
Abstract. The description of public resources such as web site contents, web services or data ļ¬les in open peer-to-peer networks using some formal framework like RDF usually reļ¬...
Matthias Nickles, Gerhard Weiß
DIAGRAMS
2006
Springer
14 years 27 days ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel
ROBOCUP
2007
Springer
167views Robotics» more  ROBOCUP 2007»
14 years 5 months ago
Cooperative/Competitive Behavior Acquisition Based on State Value Estimation of Others
The existing reinforcement learning approaches have been suļ¬€ering from the curse of dimension problem when they are applied to multiagent dynamic environments. One of the typical...
Kentarou Noma, Yasutake Takahashi, Minoru Asada