Sciweavers

203 search results - page 32 / 41
» Second-Order Risk Constraints
Sort
View
CHI
2007
ACM
13 years 11 months ago
"Get real!": what's wrong with hci prototyping and how can we fix it?
A prototype of computing technology--as a means to evaluate and communicate a good idea--is often an essential step towards useful, shipping products and towards a deeper understa...
William Jones, Jared M. Spool, Jonathan Grudin, Vi...
DAWAK
2006
Springer
13 years 11 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
RTSS
1997
IEEE
13 years 11 months ago
On adaptive resource allocation for complex real-time application
Resource allocation for high-performance real-time applications is challenging due to the applications' data-dependent nature, dynamic changes in their external environment, ...
Daniela Rosu, Karsten Schwan, Sudhakar Yalamanchil...
ATAL
2008
Springer
13 years 9 months ago
Identifying beneficial teammates using multi-dimensional trust
Multi-agent teams must be capable of selecting the most beneficial teammates for different situations. Multi-dimensional trustworthiness assessments have been shown significantly ...
Jaesuk Ahn, Xin Sui, David DeAngelis, K. Suzanne B...
ATAL
2008
Springer
13 years 9 months ago
Towards agents participating in realistic multi-unit sealed-bid auctions
When autonomous agents decide on their bidding strategies in real world auctions, they have a number of concerns that go beyond the models that are normally analyzed in traditiona...
Ioannis A. Vetsikas, Nicholas R. Jennings