Sciweavers

1195 search results - page 50 / 239
» Resources for Situated Actions
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
IJCAI
2003
13 years 9 months ago
Definition and Complexity of Some Basic Metareasoning Problems
In most real-world settings, due to limited time or other resources, an agent cannot perform all potentially useful deliberation and information gathering actions. This leads to t...
Vincent Conitzer, Tuomas Sandholm
ACSAC
2004
IEEE
13 years 11 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning
EXACT
2008
13 years 10 months ago
Integrating Probabilistic and Knowledge-Based Systems for Explanation Generation
An important requirement for intelligent assistants is to have an explanation generation mechanism, so that the trainee has a better understanding of the recommended actions and ca...
Francisco Elizalde, Luis Enrique Sucar, Julieta No...
JSSPP
1998
Springer
14 years 7 days ago
A Resource Management Architecture for Metacomputing Systems
Metacomputing systems are intended to support remote and/or concurrent use of geographically distributed computational resources. Resource management in such systems is complicate...
Karl Czajkowski, Ian T. Foster, Nicholas T. Karoni...