Sciweavers

1002 search results - page 184 / 201
» Constraint Answer Set Solving
Sort
View
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin
CIKM
2006
Springer
15 years 1 months ago
KDDCS: a load-balanced in-network data-centric storage scheme for sensor networks
We propose an In-Network Data-Centric Storage (INDCS) scheme for answering ad-hoc queries in sensor networks. Previously proposed In-Network Storage (INS) schemes suffered from St...
Mohamed Aly, Kirk Pruhs, Panos K. Chrysanthis
FQAS
2006
Springer
101views Database» more  FQAS 2006»
15 years 1 months ago
Cooperative Discovery of Interesting Action Rules
Action rules introduced in [12] and extended further to e-action rules [21] have been investigated in [22], [13], [20]. They assume that attributes in a database are divided into t...
Agnieszka Dardzinska, Zbigniew W. Ras
AAAI
2008
14 years 12 months ago
Unknown Rewards in Finite-Horizon Domains
"Human computation" is a recent approach that extracts information from large numbers of Web users. reCAPTCHA is a human computation project that improves the process of...
Colin McMillen, Manuela M. Veloso
IAAI
1993
14 years 11 months ago
COMPAQ QuickSource: Providing the Consumer with the Power of Artificial Intelligence
This paper describes COMPAQ QuickSource, an electronic problem-solving and information system for Compaq’s line of networked printers. A major goal in designing this system was ...
Trung Nguyen, Mary Czerwinski, Dan Lee