Sciweavers

5196 search results - page 1001 / 1040
» State of Application Assessment
Sort
View
CIA
2004
Springer
14 years 17 days ago
Auction Equilibrium Strategies for Task Allocation in Uncertain Environments
Abstract. In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tas...
David Sarne, Meirav Hadad, Sarit Kraus
ASIACRYPT
2006
Springer
14 years 17 days ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
ATAL
2006
Springer
14 years 17 days ago
Continuous refinement of agent resource estimates
The challenge we address is to reason about projected resource usage within a hierarchical task execution framework in order to improve agent effectiveness. Specifically, we seek ...
David N. Morley, Karen L. Myers, Neil Yorke-Smith
ATAL
2006
Springer
14 years 17 days ago
Reinforcement learning for declarative optimization-based drama management
A long-standing challenge in interactive entertainment is the creation of story-based games with dynamically responsive story-lines. Such games are populated by multiple objects a...
Mark J. Nelson, David L. Roberts, Charles Lee Isbe...
CCS
2006
ACM
14 years 17 days ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
« Prev « First page 1001 / 1040 Last » Next »