Sciweavers

504 search results - page 62 / 101
» Network management views using delegated agents
Sort
View
WISEC
2010
ACM
14 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
FGCS
2000
93views more  FGCS 2000»
14 years 9 months ago
Sharing objects in a distributed, single address space environment
With reference to an object type defining the two basic operations, read and write, we present solutions to the object sharing problem, classified according to the migration and/o...
Gianluca Dini, Lanfranco Lopriore
SOCIALCOM
2010
14 years 7 months ago
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion
Text data pertaining to socio-technical networks often are analyzed separately from relational data, or are reduced to the fact and strength of the flow of information between node...
Jana Diesner, Kathleen M. Carley
NIPS
2001
14 years 11 months ago
Multiagent Planning with Factored MDPs
We present a principled and efficient planning algorithm for cooperative multiagent dynamic systems. A striking feature of our method is that the coordination and communication be...
Carlos Guestrin, Daphne Koller, Ronald Parr
JMLR
2006
153views more  JMLR 2006»
14 years 9 months ago
Collaborative Multiagent Reinforcement Learning by Payoff Propagation
In this article we describe a set of scalable techniques for learning the behavior of a group of agents in a collaborative multiagent setting. As a basis we use the framework of c...
Jelle R. Kok, Nikos A. Vlassis