Sciweavers

8080 search results - page 212 / 1616
» From Computer Networks to Agent Networks
Sort
View
MINENET
2006
ACM
15 years 9 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
15 years 7 months ago
On-line evolutionary computation for reinforcement learning in stochastic domains
In reinforcement learning, an agent interacting with its environment strives to learn a policy that specifies, for each state it may encounter, what action to take. Evolutionary c...
Shimon Whiteson, Peter Stone
CORR
2006
Springer
95views Education» more  CORR 2006»
15 years 3 months ago
The computational power of population protocols
We consider the model of population protocols introduced by Angluin et al. [AAD+ 04], in which anonymous finite-state agents stably compute a predicate of the multiset of their in...
Dana Angluin, James Aspnes, David Eisenstat, Eric ...
ICDCSW
2003
IEEE
15 years 9 months ago
Middleware and Application Adaptation Requirements and Their Support in Pervasive Computing
Pervasive computing environments are characterized by an additional heterogeneity compared to existing computing infrastructures. Devices ranging from small embedded systems to fu...
Christian Becker, Gregor Schiele
JIPS
2010
195views more  JIPS 2010»
14 years 10 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa