Sciweavers

8493 search results - page 1389 / 1699
» Implementing a distributed firewall
Sort
View
LMO
1996
15 years 6 months ago
Using Metaobjects to Model Concurrent Objects with PICT
We seek to support the development of open, distributed applications from patible software abstractions. In order to rigorously specify these abstractions, we are elaborating a for...
Markus Lumpe, Jean-Guy Schneider, Oscar Nierstrasz
UAI
1990
15 years 5 months ago
Ideal reformulation of belief networks
The intelligent reformulation or restructuring of a belief network can greatly increase the efficiency of inference. However, time expended for reformulation is not available for ...
Jack S. Breese, Eric Horvitz
SWAP
2007
15 years 5 months ago
Who the FOAF knows Alice? RDF Revocation in DBin 2.0
In this paper we take a view from the bottom to RDF(S) reasoning. We discuss some issues and requirements on reasoning towards effectively building Semantic Web Pipes, aggregating ...
Christian Morbidoni, Axel Polleres, Giovanni Tumma...
WCE
2007
15 years 5 months ago
Nonstationary Inverse Source Problem of Active Shielding
—The problem of active shielding of some domains from the effect of the sources distributed in other domains is considered. The problem can be formulated either in a bounded dom...
S. V. Utyuzhnikov
ATAL
2010
Springer
15 years 5 months ago
Point-based policy generation for decentralized POMDPs
Memory-bounded techniques have shown great promise in solving complex multi-agent planning problems modeled as DEC-POMDPs. Much of the performance gains can be attributed to pruni...
Feng Wu, Shlomo Zilberstein, Xiaoping Chen
« Prev « First page 1389 / 1699 Last » Next »