Sciweavers

4597 search results - page 871 / 920
» The Spider Model of Agents
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Analyzing the performance of randomized information sharing
In large, collaborative, heterogeneous teams, team members often collect information that is useful to other members of the team. Recognizing the utility of such information and d...
Prasanna Velagapudi, Oleg A. Prokopyev, Katia P. S...
DALT
2009
Springer
14 years 2 months ago
Declarative and Numerical Analysis of Edge Creation Process in Trust-Based Social Networks
Online social networks are enjoying drastic increase in their population and connectivity. One of the fundamental issues in these networks is trust, which is an essential factor in...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...
IDEAL
2009
Springer
14 years 2 months ago
STORM - A Novel Information Fusion and Cluster Interpretation Technique
Abstract. Analysis of data without labels is commonly subject to scrutiny by unsupervised machine learning techniques. Such techniques provide more meaningful representations, usef...
Jan Feyereisl, Uwe Aickelin
MIG
2009
Springer
14 years 2 months ago
Exploiting Motion Capture to Enhance Avoidance Behaviour in Games
Abstract. Realistic simulation of interacting virtual characters is essential in computer games, training and simulation applications. The problem is very challenging since people ...
Ben J. H. van Basten, Sander E. M. Jansen, Ioannis...
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...