Sciweavers

317 search results - page 37 / 64
» Who gives a tweet
Sort
View
DEON
2006
Springer
13 years 10 months ago
Delegation of Power in Normative Multiagent Systems
In this paper we reconsider the definition of counts-as relations in normative multiagent systems: counts-as relations do not always provide directly act interpretation of brute fa...
Guido Boella, Leendert W. N. van der Torre
KESAMSTA
2010
Springer
13 years 10 months ago
Modelling Dynamic Forgetting in Distributed Information Systems
Abstract. We describe and model a new aspect in the design of distributed information systems. We build upon a previously described problem on the microlevel, which asks how quickl...
Nicolas Höning, Martijn C. Schut
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
MASCOTS
2008
13 years 10 months ago
Finding Good Configurations in High-Dimensional Spaces: Doing More with Less
Manually tuning tens to hundreds of configuration parameters in a complex software system like a database or an application server is an arduous task. Recent work has looked into ...
Risi Thonangi, Vamsidhar Thummala, Shivnath Babu
NIPS
2007
13 years 10 months ago
A Game-Theoretic Approach to Apprenticeship Learning
We study the problem of an apprentice learning to behave in an environment with an unknown reward function by observing the behavior of an expert. We follow on the work of Abbeel ...
Umar Syed, Robert E. Schapire