Sciweavers

13987 search results - page 2689 / 2798
» The Two Guards Problem
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 9 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
FLAIRS
2006
13 years 9 months ago
Coalition Formation Meets Information Theory
The process of coalition formation, where distinct autonomous agents come together to act as a coherent group is an important form of interaction in multiagent systems. Previous w...
Victor Palmer, Thomas R. Ioerger
FOIS
2006
13 years 9 months ago
Simultaneous Events and the "Once-Only" Effect
Abstract. Some events recur, and some happen only once. Galton refers to the latter as "once-only" events [1]. In a first-order logic of events that makes a type-token di...
Haythem O. Ismail
HCI
2001
13 years 9 months ago
Configuring social agents
Social agents have recently been more frequently used in the user interface. However, so far not many studies have been conducted on what impact such interfaces have on users beha...
Charlotte Wiberg, Mikael Wiberg
LWA
2004
13 years 9 months ago
An Assessment Framework for eLearning in the Semantic Web
In this paper we present a flexible assessment framework for eLearning based on semantic web technologies. The assessment techniques are formalized as reasoning rules. These rules...
Lilia Cheniti-Belcadhi, Nicola Henze, Rafik Braham
« Prev « First page 2689 / 2798 Last » Next »