Sciweavers

184 search results - page 17 / 37
» Quality Assessment of Large Scale Knowledge Resources
Sort
View
ATAL
2011
Springer
12 years 8 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
ECHT
1992
14 years 21 days ago
Two Years before the Mist: Experiences with Aquanet
Aquanet is a collaborative hypertext tool that combines elements of frame-based knowledge representation and graphical presentation. In this paper, we examine the first major appl...
Catherine C. Marshall, Russell A. Rogers
CORR
2010
Springer
64views Education» more  CORR 2010»
13 years 8 months ago
A Trustability Metric for Code Search based on Developer Karma
The promise of search-driven development is that developers will save time and resources by reusing external code in their local projects. To efficiently integrate this code, user...
Florian S. Gysin, Adrian Kuhn
AAAI
2012
11 years 11 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
IJCAI
2003
13 years 10 months ago
Towards Cooperative Negotiation for Decentralized Resource Allocation in Autonomic Computing Systems
Resource allocation is a key problem in autonomic computing. In this paper we use a data center scenario to motivate the need for decentralization and cooperative negotiation, and...
Craig Boutilier, Rajarshi Das, Jeffrey O. Kephart,...