Sciweavers

4142 search results - page 716 / 829
» Trusting an Information Agent
Sort
View
AAAI
2012
13 years 7 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
AAAI
2012
13 years 7 months ago
Generalized Sampling and Variance in Counterfactual Regret Minimization
In large extensive form games with imperfect information, Counterfactual Regret Minimization (CFR) is a popular, iterative algorithm for computing approximate Nash equilibria. Whi...
Richard G. Gibson, Marc Lanctot, Neil Burch, Duane...
AAAI
2012
13 years 7 months ago
Far Out: Predicting Long-Term Human Mobility
Much work has been done on predicting where is one going to be in the immediate future, typically within the next hour. By contrast, we address the open problem of predicting huma...
Adam Sadilek, John Krumm
145
Voted
CSFW
2007
IEEE
15 years 11 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
111
Voted
IRI
2005
IEEE
15 years 10 months ago
Knowledge representation for product design using Techspecs Concept Ontology
Sharing and reusing product design information can help reduce cost and time when developing new products and facilitate good product family design. An appropriate representation ...
Seung Ki Moon, Soundar R. T. Kumara, Timothy W. Si...