Sciweavers

8492 search results - page 1527 / 1699
» Modelling and Design of Multi-Agent Systems
Sort
View
CSREASAM
2003
15 years 6 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
IJCAI
2001
15 years 6 months ago
Executing Reactive, Model-based Programs through Graph-based Temporal Planning
In the future, webs of unmanned air and space vehicles will act together to robustly perform elaborate missions in uncertain environments. We coordinate these systems by introduci...
Phil Kim, Brian C. Williams, Mark Abramson
SERP
2003
15 years 6 months ago
A Process for BDI Agent-Based Software Construction
Agent-based programming comes us as a next generation programming paradigm. However, we have not been ready yet to fully use it without having sound and concrete software engineer...
Chang-Hyun Jo, Jeffery M. Einhorn
149
Voted
BMCBI
2006
111views more  BMCBI 2006»
15 years 5 months ago
High throughput profile-profile based fold recognition for the entire human proteome
Background: In order to maintain the most comprehensive structural annotation databases we must carry out regular updates for each proteome using the latest profile-profile fold r...
Liam J. McGuffin, Richard T. Smith, Kevin Bryson, ...
CSL
2006
Springer
15 years 5 months ago
Support vector machines for speaker and language recognition
Support vector machines (SVMs) have proven to be a powerful technique for pattern classification. SVMs map inputs into a high dimensional space and then separate classes with a hy...
William M. Campbell, Joseph P. Campbell, Douglas A...
« Prev « First page 1527 / 1699 Last » Next »