Sciweavers

762 search results - page 91 / 153
» Security Contexts in Autonomic Systems
Sort
View
AAAI
2006
13 years 11 months ago
Know Thine Enemy: A Champion RoboCup Coach Agent
In a team-based multiagent system, the ability to construct a model of an opponent team's joint behavior can be useful for determining an agent's expected distribution o...
Gregory Kuhlmann, William B. Knox, Peter Stone
IJCAI
2001
13 years 11 months ago
Perceptual Anchoring of Symbols for Action
Anchoring is the process of creating and maintaining the correspondence between symbols and percepts that refer to the same physical objects. Although this process must necessaril...
Silvia Coradeschi, Alessandro Saffiotti
FLAIRS
2003
13 years 11 months ago
Cost-Based Policy Mapping for Imitation
Imitation represents a powerful approach for programming and autonomous learning in robot and computer systems. An important aspect of imitation is the mapping of observations to ...
Srichandan V. Gudla, Manfred Huber
RIVF
2003
13 years 11 months ago
Query Brokers for Distributed and Flexible Query Evaluation
Abstract— This paper presents our work on supporting flexible query evaluation over large distributed, heterogeneous, and autonomous sources. Flexibility means that the query ev...
Tuyet-Trinh Vu, Christine Collet
JISE
2010
110views more  JISE 2010»
13 years 4 months ago
SOA-based Service Layering for Facilitating Dynamic Service Composition and Alternative Service Discovery
abstraction for ubiquitous computing. The key to service modeling of SOA-based systems is in classifying services into business, application, and orchestration layers. However, ser...
Meeyeon Lee, Jung-Won Lee, Seung Soo Park, We-Duke...