Sciweavers

5196 search results - page 1001 / 1040
» State of Application Assessment
Sort
View
127
Voted
CIA
2004
Springer
15 years 7 months ago
Auction Equilibrium Strategies for Task Allocation in Uncertain Environments
Abstract. In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tas...
David Sarne, Meirav Hadad, Sarit Kraus
ASIACRYPT
2006
Springer
15 years 7 months ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
128
Voted
ATAL
2006
Springer
15 years 7 months ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith
130
Voted
ATAL
2006
Springer
15 years 7 months ago
Reinforcement learning for declarative optimization-based drama management
A long-standing challenge in interactive entertainment is the creation of story-based games with dynamically responsive story-lines. Such games are populated by multiple objects a...
Mark J. Nelson, David L. Roberts, Charles Lee Isbe...
118
Voted
CCS
2006
ACM
15 years 7 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
« Prev « First page 1001 / 1040 Last » Next »