Sciweavers

1117 search results - page 170 / 224
» A Compliance Model of Trust
Sort
View
ATAL
2007
Springer
15 years 3 months ago
Determining confidence when integrating contributions from multiple agents
Integrating contributions received from other agents is an essential activity in multi-agent systems (MASs). Not only must related contributions be integrated together, but the co...
Raphen Becker, Daniel D. Corkill
MP
2002
176views more  MP 2002»
14 years 11 months ago
UOBYQA: unconstrained optimization by quadratic approximation
UOBYQA is a new algorithm for general unconstrained optimization calculations, that takes account of the curvature of the objective function, F say, by forming quadratic models by ...
M. J. D. Powell
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
16 years 13 days ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...
ICS
2010
Tsinghua U.
15 years 9 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
15 years 6 months ago
Safe robot arm with safe joint mechanism using nonlinear spring system for collision safety
—Collision safety between humans and robots has drawn much attention since service robots are increasingly being used in human environments. A safe robot arm based on passive com...
Jung-Jun Park, Hwi-Su Kim, Jae-Bok Song