Sciweavers

285 search results - page 44 / 57
» On Specifying Contract Negotiations
Sort
View
IADIS
2004
13 years 8 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
EDM
2009
147views Data Mining» more  EDM 2009»
13 years 5 months ago
an Argument Learning Environment Using Agent-Based ITS (ALES)
This paper presents an agent-based educational environment to teach argument analysis (ALES). The idea is based on the Argumentation Interchange Format Ontology (AIF) using "W...
Safia Abbas, Hajime Sawamura
SACMAT
2003
ACM
14 years 19 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
ICML
2000
IEEE
14 years 8 months ago
Convergence Problems of General-Sum Multiagent Reinforcement Learning
Stochastic games are a generalization of MDPs to multiple agents, and can be used as a framework for investigating multiagent learning. Hu and Wellman (1998) recently proposed a m...
Michael H. Bowling
ICCAD
2001
IEEE
101views Hardware» more  ICCAD 2001»
14 years 4 months ago
Instruction Generation for Hybrid Reconfigurable Systems
In this work, we present an algorithm for simultaneous template generation and matching. The algorithm profiles the graph and iteratively contracts edges to create the templates. ...
Ryan Kastner, Seda Ogrenci Memik, Elaheh Bozorgzad...