Sciweavers

249 search results - page 48 / 50
» Incorporating Security Behaviour into Business Models Using ...
Sort
View
ATAL
2008
Springer
13 years 8 months ago
A distributed normative infrastructure for situated multi-agent organisations
In most of the existing approaches to the design of multiagent systems, there is no clear way in which to relate organisational and normative structures to the model of the enviro...
Fabio Y. Okuyama, Rafael H. Bordini, Antônio...
BMCBI
2010
126views more  BMCBI 2010»
13 years 3 months ago
PETALS: Proteomic Evaluation and Topological Analysis of a mutated Locus' Signaling
Background: Colon cancer is driven by mutations in a number of genes, the most notorious of which is Apc. Though much of Apc's signaling has been mechanistically identified o...
Gürkan Bebek, Vishal Patel, Mark R. Chance
3DPVT
2006
IEEE
295views Visualization» more  3DPVT 2006»
13 years 8 months ago
Efficient Sparse 3D Reconstruction by Space Sweeping
This paper introduces a feature based method for the fast generation of sparse 3D point clouds from multiple images with known pose. We extract sub-pixel edge elements (2D positio...
Joachim Bauer, Christopher Zach, Horst Bischof
JAIR
2006
157views more  JAIR 2006»
13 years 6 months ago
Decision-Theoretic Planning with non-Markovian Rewards
A decision process in which rewards depend on history rather than merely on the current state is called a decision process with non-Markovian rewards (NMRDP). In decisiontheoretic...
Sylvie Thiébaux, Charles Gretton, John K. S...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer