Sciweavers

551 search results - page 63 / 111
» On the design of metaheuristic algorithms using fuzzy rules
Sort
View
ATAL
2006
Springer
15 years 1 months ago
Robust mechanisms for information elicitation
We study information elicitation mechanisms in which a principal agent attempts to elicit the private information of other agents using a carefully selected payment scheme based o...
Aviv Zohar, Jeffrey S. Rosenschein
ECTEL
2007
Springer
15 years 3 months ago
Using MotSaRT to Support On-Line Teachers in Student Motivation
Motivation to learn is affected by a student’s self-efficacy, goal orientation, locus of control and perceived task difficulty. In the classroom, teachers know how to motivate th...
Teresa Hurley, Stephan Weibelzahl
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
14 years 9 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 3 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
ATAL
2003
Springer
15 years 3 months ago
Designing Self-Assembly for 2-Dimensional Building Blocks
In this paper we present a genetic algorithm-based approach towards designing self-assembling objects comprised of square smart blocks. Each edge of each block can have one of thr...
Ying Guo, Geoff Poulton, Philip Valencia, Geoff Ja...