Sciweavers

101 search results - page 13 / 21
» Formal approach to security metrics.: what does
Sort
View
97
Voted
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 5 months ago
Issues in Rational Planning in Multi-Agent Settings
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents operating in multi-agent environments. We use the...
Piotr J. Gmytrasiewicz
IAT
2009
IEEE
15 years 7 months ago
Topology and Memory Effect on Convention Emergence
Abstract—Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. We perform an in-depth stu...
Daniel Villatoro, Sandip Sen, Jordi Sabater-Mir
100
Voted
ICMAS
2000
15 years 1 months ago
Self-Organizing Manufacturing Control: An Industrial Application of Agent Technology
We present an auction-based approach to manufacturing control. Workpieces auction off their current task, while machines bid for tasks. When awarding a machine, a workpiece takes ...
Stefan Bussmann, Klaus Schild
GECCO
2004
Springer
138views Optimization» more  GECCO 2004»
15 years 6 months ago
Exploratory Data Analysis with Interactive Evolution
We illustrate with two simple examples how Interactive Evolutionary Computation (IEC) can be applied to Exploratory Data Analysis (EDA). IEC is particularly valuable in an EDA cont...
Sergey Malinchik, Eric Bonabeau
115
Voted
IWCMC
2006
ACM
15 years 6 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras