Sciweavers

2439 search results - page 445 / 488
» Learning to Coordinate Behaviors
Sort
View
ICRA
1998
IEEE
141views Robotics» more  ICRA 1998»
15 years 2 months ago
On Discontinuous Human Control Strategies
Models of human control strategy (HCS), which accurately emulate dynamic human behavior, have far reaching potential in areas ranging from robotics to virtual reality to the intel...
Michael C. Nechyba, Yangsheng Xu
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICCAD
1997
IEEE
121views Hardware» more  ICCAD 1997»
15 years 2 months ago
Adaptive methods for netlist partitioning
An algorithm that remains in use at the core of many partitioning systems is the Kernighan-Lin algorithm and a variant the Fidducia-Matheysses (FM) algorithm. To understand the FM...
Wray L. Buntine, Lixin Su, A. Richard Newton, Andr...
AGENTS
1997
Springer
15 years 1 months ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 1 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa