Sciweavers

4394 search results - page 809 / 879
» Designing agent chips
Sort
View
FLAIRS
2009
14 years 8 months ago
Making User-Defined Interactive Game Characters BEHAVE
With the most resource intensive tasks in games offloaded to special purpose processors, game designers now have the opportunity to build richer characters using more complex AI t...
Frederick W. P. Heckel, G. Michael Youngblood, D. ...
ICAC
2009
IEEE
14 years 8 months ago
Using distributed w-learning for multi-policy optimization in decentralized autonomic systems
Distributed W-Learning (DWL) is a reinforcement learningbased algorithm for multi-policy optimization in agent-based systems. In this poster we propose the use of DWL for decentra...
Ivana Dusparic, Vinny Cahill
ICSOC
2009
Springer
14 years 7 months ago
Lightweight Composition of Ad-Hoc Enterprise-Class Applications with Context-Aware Enterprise Mashups
The huge demand for ad-hoc and situational enterprise-class applications led to a new kind of Web-based applications, known as enterprise mashups. End users from the business units...
Florian Gilles, Volker Hoyer, Till Janner, Katarin...
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
14 years 7 months ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
97
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 5 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald