Sciweavers

1086 search results - page 138 / 218
» Management of trusted citations
Sort
View
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Case of Honda: A Dialectical yet Coherent Firm
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
W. David Holford, Mehran Ebrahimi
ATAL
2007
Springer
14 years 4 months ago
An agent-based approach for privacy-preserving recommender systems
Recommender Systems are used in various domains to generate personalized information based on personal user data. The ability to preserve the privacy of all participants is an ess...
Richard Cissée, Sahin Albayrak
ATAL
2007
Springer
14 years 4 months ago
An equal excess negotiation algorithm for coalition formation
Coalition formation is an important form of interaction in multiagent systems. It enables the agents to satisfy tasks that they would otherwise be unable to perform, or would perf...
Hrishikesh J. Goradia, José M. Vidal
ECUMN
2007
Springer
14 years 4 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
14 years 4 months ago
A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation
Surrogate-Assisted Memetic Algorithm(SAMA) is a hybrid evolutionary algorithm, particularly a memetic algorithm that employs surrogate models in the optimization search. Since mos...
Dudy Lim, Yew-Soon Ong, Yaochu Jin, Bernhard Sendh...