Sciweavers

1621 search results - page 209 / 325
» What is Business Intelligence
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Verifying Norm Compliancy of Protocols
There is a wide agreement on the use of norms in order to specify the expected behaviour of agents in open MAS. However, in highly regulated domains, where norms dictate what can a...
Huib Aldewereld, Javier Vázquez-Salceda, Fr...
CAEPIA
2005
Springer
14 years 1 months ago
Internal Categories with Irregular Geometry and Overlapping in ART Networks
PolyTope ARTMAP (PTAM) [6] is an ART neural network based on internal categories with irregular polytope (polygon in IRn ) geometry. Categories in PTAM do not overlap, so that thei...
Dinani Gomes, Manuel Fernández Delgado, Sen...
CEEMAS
2005
Springer
14 years 1 months ago
Combining Rule-Based and Plug-in Components in Agents for Flexible Dynamic Negotiations
For software agents to become part of e-commerce they have to be flexible—to engage in negotiations of forms which are not known in advance, and mobile—to migrate to remote lo...
Costin Badica, Maria Ganzha, Marcin Paprzycki, Ama...
CP
2005
Springer
14 years 1 months ago
Robust Constraint Solving Using Multiple Heuristics
Abstract. Constraint Programming is a proven successful technique, but it requires skill in modeling problems, and knowledge on how algorithms interact with models. What can be a g...
Alfio Vidotto, Kenneth N. Brown, J. Christopher Be...
IWINAC
2005
Springer
14 years 1 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han