Sciweavers

4394 search results - page 809 / 879
» Designing agent chips
Sort
View
FLAIRS
2009
15 years 1 months ago
Making User-Defined Interactive Game Characters BEHAVE
With the most resource intensive tasks in games offloaded to special purpose processors, game designers now have the opportunity to build richer characters using more complex AI t...
Frederick W. P. Heckel, G. Michael Youngblood, D. ...
149
Voted
ICAC
2009
IEEE
15 years 1 months ago
Using distributed w-learning for multi-policy optimization in decentralized autonomic systems
Distributed W-Learning (DWL) is a reinforcement learningbased algorithm for multi-policy optimization in agent-based systems. In this poster we propose the use of DWL for decentra...
Ivana Dusparic, Vinny Cahill
145
Voted
ICSOC
2009
Springer
15 years 1 months ago
Lightweight Composition of Ad-Hoc Enterprise-Class Applications with Context-Aware Enterprise Mashups
The huge demand for ad-hoc and situational enterprise-class applications led to a new kind of Web-based applications, known as enterprise mashups. End users from the business units...
Florian Gilles, Volker Hoyer, Till Janner, Katarin...
116
Voted
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
15 years 19 days ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
132
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 10 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald