Sciweavers

994 search results - page 176 / 199
» Modeling and Inference with Relational Dynamic Bayesian Netw...
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks
— In this paper, we propose a game theoretic approach to tackle the problem of the distributed formation of the hierarchical network architecture that connects the nodes in the u...
Walid Saad, Quanyan Zhu, Tamer Basar, Zhu Han, Are...
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
15 years 6 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts
BIRTHDAY
2009
Springer
15 years 8 months ago
A Semantical Account of Progression in the Presence of Defaults
In previous work, we proposed a modal fragment of the situation calculus called ES, which fully captures Reiter’s basic action theories. ES also has epistemic features, includin...
Gerhard Lakemeyer, Hector J. Levesque
COGSR
2010
102views more  COGSR 2010»
14 years 8 months ago
Emergence of self-organized symbol-based communication in artificial creatures
In this paper, we describe a digital scenario where we simulated the emergence of self-organized symbol-based communication among artificial creatures inhabiting a virtual world of...
Angelo Loula, Ricardo R. Gudwin, Charbel Niñ...
ISSA
2004
15 years 2 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha