Sciweavers

1072 search results - page 160 / 215
» Knowledge and information distribution leveraged by intellig...
Sort
View
AAAI
2007
13 years 11 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
AAAI
2000
13 years 10 months ago
Coordination for Multi-Robot Exploration and Mapping
This paper addresses the problem of exploration and mapping of an unknown environment by multiple robots. The mapping algorithm is an on-line approach to likelihood maximization t...
Reid G. Simmons, David Apfelbaum, Wolfram Burgard,...
WOA
2010
13 years 6 months ago
An Agent-based System for Maritime Search and Rescue Operations
Maritime search and rescue operations are critical missions involving personnel, boats, helicopter, aircrafts in a struggle against time often worsened by adversary sea and weather...
Salvatore Aronica, Francesco Benvegna, Massimo Cos...
ATAL
2004
Springer
14 years 2 months ago
Resource Allocation in the Grid Using Reinforcement Learning
One of the main challenges in Grid computing is efficient allocation of resources (CPU-hours, network bandwidth, etc.) to the tasks submitted by users. Due to the lack of centrali...
Aram Galstyan, Karl Czajkowski, Kristina Lerman
ATAL
2008
Springer
13 years 10 months ago
Complexity of terminating preference elicitation
Complexity theory is a useful tool to study computational issues surrounding the elicitation of preferences, as well as the strategic manipulation of elections aggregating togethe...
Toby Walsh