Sciweavers

309 search results - page 57 / 62
» Partial Move A*
Sort
View
ICICS
2005
Springer
14 years 6 days ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ISRR
2005
Springer
149views Robotics» more  ISRR 2005»
14 years 6 days ago
Emergence, Exploration and Learning of Embodied Behavior
A novel model for dynamic emergence and adaptation of embodied behavior is proposed. A musculo-skeletal system is controlled by a number of chaotic elements, each of which driving...
Yasuo Kuniyoshi, Shinsuke Suzuki, Shinji Sangawa
SPAA
2004
ACM
14 years 4 days ago
Fighting against two adversaries: page migration in dynamic networks
Page migration is one of the fundamental subproblems in the framework of data management in networks. It occurs in a distributed network of processors sharing one indivisible memo...
Marcin Bienkowski, Miroslaw Korzeniowski, Friedhel...
AMEC
2004
Springer
14 years 3 days ago
Designing Auctions for Deliberative Agents
Abstract. In many settings, bidding agents for auctions do not know their preferences a priori. Instead, they must actively determine them through deliberation (e.g., information p...
Kate Larson, Tuomas Sandholm
MFCS
2004
Springer
14 years 2 days ago
Boxed Ambients with Communication Interfaces
We define BACI (Boxed Ambients with Communication Interfaces), an ambient calculus with a flexible communication policy. Traditionally, typed ambient calculi have a fixed commu...
Eduardo Bonelli, Adriana B. Compagnoni, Mariangiol...