Sciweavers

139 search results - page 13 / 28
» Graph-based methods for the analysis of large-scale multiage...
Sort
View
ICSM
2009
IEEE
14 years 2 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
ATAL
2003
Springer
14 years 22 days ago
Role allocation and reallocation in multiagent teams: towards a practical analysis
Despite the success of the BDI approach to agent teamwork, initial role allocation (i.e. deciding which agents to allocate to key roles in the team) and role reallocation upon fai...
Ranjit Nair, Milind Tambe, Stacy Marsella
AAAI
2012
11 years 10 months ago
Characterizing Multi-Agent Team Behavior from Partial Team Tracings: Evidence from the English Premier League
Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals...
Patrick Lucey, Alina Bialkowski, Peter Carr, Eric ...
INFFUS
2010
121views more  INFFUS 2010»
13 years 6 months ago
The statistical mechanics of belief sharing in multi-agent systems
- Many exciting, emerging applications require that a group of agents share a coherent view of the world given spatial distribution, incomplete and uncertain sensors, and communica...
Robin Glinton, Katia P. Sycara, David Scerri, Paul...
CIS
2007
Springer
14 years 1 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang