Sciweavers

34202 search results - page 6784 / 6841
» The Tera computer system
Sort
View
ATAL
2010
Springer
13 years 8 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
ATAL
2010
Springer
13 years 8 months ago
Evolving policy geometry for scalable multiagent learning
A major challenge for traditional approaches to multiagent learning is to train teams that easily scale to include additional agents. The problem is that such approaches typically...
David B. D'Ambrosio, Joel Lehman, Sebastian Risi, ...
ATAL
2010
Springer
13 years 8 months ago
Strategy-proof allocation of multiple items between two agents without payments or priors
We investigate the problem of allocating items (private goods) among competing agents in a setting that is both prior-free and paymentfree. Specifically, we focus on allocating mu...
Mingyu Guo, Vincent Conitzer
DIM
2008
ACM
13 years 8 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
GECCO
2008
Springer
145views Optimization» more  GECCO 2008»
13 years 8 months ago
Memory with memory: soft assignment in genetic programming
Based in part on observations about the incremental nature of most state changes in biological systems, we introduce the idea of Memory with Memory in Genetic Programming (GP), wh...
Nicholas Freitag McPhee, Riccardo Poli
« Prev « First page 6784 / 6841 Last » Next »