Sciweavers

530 search results - page 104 / 106
» The resource pooling principle
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 7 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
JAIR
2008
157views more  JAIR 2008»
13 years 7 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
ML
2008
ACM
13 years 7 months ago
Incremental exemplar learning schemes for classification on embedded devices
Although memory-based classifiers offer robust classification performance, their widespread usage on embedded devices is hindered due to the device's limited memory resources...
Ankur Jain, Daniel Nikovski
UMUAI
2008
144views more  UMUAI 2008»
13 years 7 months ago
Tag-based user modeling for social multi-device adaptive guides
This paper aims to demonstrate that the principles of adaptation and user modeling, especially social annotation, can be integrated fruitfully with those of the Web 2.0 paradigm a...
Francesca Carmagnola, Federica Cena, Luca Console,...
AAI
1998
99views more  AAI 1998»
13 years 6 months ago
Toward Socially Intelligent Service Robots
In the Intelligent Robotics Laboratory (IRL) at Vanderbilt University we seek to develop service robots with a high level of social intelligence and interactivity. In order to ach...
Mitchell Wilkes, W. Anthony Alford, Robert T. Pack...