Sciweavers

4498 search results - page 211 / 900
» How to Invent Functions
Sort
View
CSREASAM
2003
15 years 5 months ago
Securing FIPA Agent Communication
— The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consi...
Niklas Borselius, Chris J. Mitchell
IJCAI
2003
15 years 5 months ago
Constructing utility models from observed negotiation actions
We propose a novel method for constructing utility models by learning from observed negotiation actions. In particular, we show how offers and counter-offers in negotiation can be...
Angelo C. Restificar, Peter Haddawy
USENIX
1994
15 years 5 months ago
The refdbms Distributed Bibliographic Database System
Refdbms is a database system for sharing bibliographic references among many users at sites on a wide-area network such as the Internet. This paper describes our experiences in bu...
Richard A. Golding, Darrell D. E. Long, John Wilke...
CORR
2007
Springer
100views Education» more  CORR 2007»
15 years 4 months ago
The Haar Wavelet Transform of a Dendrogram: Additional Notes
We consider the wavelet transform of a finite, rooted, node-ranked, p-way tree, focusing on the case of binary (p = 2) trees. We study a Haar wavelet transform on this tree. Wave...
Fionn Murtagh
SIGCSE
2002
ACM
142views Education» more  SIGCSE 2002»
15 years 4 months ago
Integrating formal models into the programming languages course
In our approach to the Programming Languages course, formal models are integrated as a thread that pervades the course, rather than as a one of many topics that is introduced and ...
Allen B. Tucker, Robert E. Noonan