Sciweavers

1216 search results - page 203 / 244
» Online Prediction with Privacy
Sort
View
SAFECOMP
2004
Springer
14 years 2 months ago
How Explicit Are the Barriers to Failure in Safety Arguments?
Safety cases embody arguments that demonstrate how safety properties of a system are upheld. Such cases implicitly document the barriers that must exist between hazards and vulnera...
Shamus P. Smith, Michael D. Harrison, Bastiaan A. ...
ECAI
2006
Springer
14 years 16 days ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
MDM
2010
Springer
250views Communications» more  MDM 2010»
13 years 11 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
AAMAS
2007
Springer
13 years 9 months ago
An agent architecture for multi-attribute negotiation using incomplete preference information
A component-based generic agent architecture for multi-attribute (integrative) negotiation is introduced and its application is described in a prototype system for negotiation abo...
Catholijn M. Jonker, Valentin Robu, Jan Treur
AIS
2007
Springer
13 years 9 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila