Sciweavers

17390 search results - page 3388 / 3478
» Distributed Data Clustering
Sort
View
ATAL
2007
Springer
15 years 6 months ago
Meta-level coordination for solving negotiation chains in semi-cooperative multi-agent systems
A negotiation chain is formed when multiple related negotiations are spread over multiple agents. In order to appropriately order and structure the negotiations occurring in the c...
Xiaoqin Zhang, Victor R. Lesser
ATAL
2007
Springer
15 years 6 months ago
Conditional random fields for activity recognition
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
CCS
2007
ACM
15 years 6 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CCS
2007
ACM
15 years 6 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CIKM
2007
Springer
15 years 6 months ago
Predictive user click models based on click-through history
Web search engines consistently collect information about users interaction with the system: they record the query they issued, the URL of presented and selected documents along w...
Benjamin Piwowarski, Hugo Zaragoza
« Prev « First page 3388 / 3478 Last » Next »