Sciweavers

716 search results - page 52 / 144
» Modelling Bounded Rationality Using Evolutionary Techniques
Sort
View
157
Voted
IACR
2011
221views more  IACR 2011»
14 years 2 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
123
Voted
NAACL
2004
15 years 3 months ago
Exponential Priors for Maximum Entropy Models
Maximum entropy models are a common modeling technique, but prone to overfitting. We show that using an exponential distribution as a prior leads to bounded absolute discounting b...
Joshua Goodman
143
Voted
TARK
2007
Springer
15 years 8 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
AAAI
2008
15 years 4 months ago
The PELA Architecture: Integrating Planning and Learning to Improve Execution
Building architectures for autonomous rational behavior requires the integration of several AI components, such as planning, learning and execution monitoring. In most cases, the ...
Sergio Jiménez, Fernando Fernández, ...
PG
2002
IEEE
15 years 7 months ago
Lworld: An Animation System Based on Rewriting
Lworld is a computer graphics animation system based on L-systems, a parallel rewriting technique used primarily in computer graphics for plant modeling. Because rulebased program...
Hansrudi Noser