Sciweavers

197 search results - page 14 / 40
» Planning-Based Control of Software Agents
Sort
View
87
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 5 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
KBS
2007
100views more  KBS 2007»
14 years 11 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
ICSE
2005
IEEE-ACM
15 years 12 months ago
Monitoring and control in scenario-based requirements analysis
Scenarios are an effective means for eliciting, validating and documenting requirements. At the requirements level, scenarios describe sequences of interactions between the softwa...
Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebasti&...
GCC
2004
Springer
15 years 5 months ago
Agent-Based Resource Selection for Grid Computing
Agent technology is critical in providing solutions to grid computing, including resource selection. Traditionally, agent deliberation offers a deductive process whose deliberation...
Song Shen, Gregory M. P. O'Hare
91
Voted
SAC
2004
ACM
15 years 5 months ago
A multi-criteria model for electronic auctions
In this paper we present a multi-criteria model for electronic auctions, which is based on reference points. According to the model, the buyer must specify an aspiration point tha...
Marie-Jo Bellosta, Imène Brigui, Sylvie Kor...