Sciweavers

14347 search results - page 2805 / 2870
» Interactive Granular Computing
Sort
View
ATAL
2005
Springer
14 years 4 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman
ATAL
2005
Springer
14 years 4 months ago
An agent-based approach for managing symbiotic simulation of semiconductor assembly and test operation
The rapid changing business environment of high-tech asset intensive enterprises such as semiconductor manufacturing constantly drives production managers to look for better solut...
Malcolm Yoke-Hean Low, Kong Wei Lye, Peter Lenderm...
CCS
2005
ACM
14 years 4 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
CIKM
2005
Springer
14 years 4 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
DBPL
2005
Springer
143views Database» more  DBPL 2005»
14 years 4 months ago
Inconsistency Tolerance in P2P Data Integration: An Epistemic Logic Approach
We study peer-to-peer ðP2PÞ data integration, where each peer models an autonomous system that exports data in terms of its own schema, and data interoperation is achieved by me...
Diego Calvanese, Giuseppe De Giacomo, Domenico Lem...
« Prev « First page 2805 / 2870 Last » Next »