Sciweavers

6770 search results - page 1119 / 1354
» How GPUs Work
Sort
View
ATAL
2008
Springer
14 years 12 days ago
Solving two-person zero-sum repeated games of incomplete information
In repeated games with incomplete information, rational agents must carefully weigh the tradeoffs of advantageously exploiting their information to achieve a short-term gain versu...
Andrew Gilpin, Tuomas Sandholm
ATAL
2008
Springer
14 years 12 days ago
Using organization knowledge to improve routing performance in wireless multi-agent networks
Multi-agent systems benefit greatly from an organization design that guides agents in determining when to communicate, how often, with whom, with what priority, and so on. However...
Huzaifa Zafar, Victor R. Lesser, Daniel D. Corkill...
ATAL
2008
Springer
14 years 12 days ago
Social norm emergence in virtual agent societies
The advent of virtual environments such as SecondLife call for a distributed approach for norm emergence and spreading. In open virtual environments, monitoring various interactin...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
ICWE
2010
Springer
14 years 12 days ago
Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements
:  Business Conversation Manager: Facilitating People Interactions in Outsourcing Service Engagements Hamid R. Motahari-Nezhad, Sven Graupner, Sharad Singhal HP Laboratories HPL...
Hamid R. Motahari Nezhad, Sven Graupner, Sharad Si...
CCS
2008
ACM
14 years 12 days ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
« Prev « First page 1119 / 1354 Last » Next »