Sciweavers

1126 search results - page 213 / 226
» Personal Navigating Agents
Sort
View
WWW
2005
ACM
16 years 2 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
ATAL
2009
Springer
15 years 8 months ago
Producing timely recommendations from social networks through targeted search
There has been a significant increase in interest and participation in social networking websites recently. For many users, social networks are indispensable tools for sharing pe...
Anil Gürsel, Sandip Sen
GECCO
2009
Springer
151views Optimization» more  GECCO 2009»
15 years 8 months ago
Evolution of functional specialization in a morphologically homogeneous robot
A central tenet of embodied artificial intelligence is that intelligent behavior arises out of the coupled dynamics between an agent’s body, brain and environment. It follows t...
Joshua S. Auerbach, Josh C. Bongard
120
Voted
SIGECOM
2009
ACM
111views ECommerce» more  SIGECOM 2009»
15 years 8 months ago
A qualitative vickrey auction
Restricting the preferences of the agents by assuming that their utility functions linearly depend on a payment allows for the positive results of the Vickrey auction and the Vick...
Paul Harrenstein, Mathijs de Weerdt, Vincent Conit...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 8 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami