Sciweavers

773 search results - page 124 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Agent interaction, multiple perspectives, and swarming simulation
Agents in a multi-agent system do not act in a vacuum. The outcome of their efforts depends on the environment in which they seek to act, and in particular on the efforts of other...
H. Van Dyke Parunak, Robert Bisson, Sven A. Brueck...
ATAL
2010
Springer
13 years 10 months ago
Robust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis o...
Christopher Kiekintveld, Milind Tambe, Janusz Mare...
FMICS
2010
Springer
13 years 10 months ago
Model Checking the FlexRay Physical Layer Protocol
Abstract. The FlexRay standard, developed by a cooperation of leading companies in the automotive industry, is a robust communication protocol for distributed components in modern ...
Michael Gerke 0002, Rüdiger Ehlers, Bernd Fin...
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 10 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
ICASSP
2010
IEEE
13 years 10 months ago
Classifying laughter and speech using audio-visual feature prediction
In this study, a system that discriminates laughter from speech by modelling the relationship between audio and visual features is presented. The underlying assumption is that thi...
Stavros Petridis, Ali Asghar, Maja Pantic