Sciweavers

262 search results - page 24 / 53
» Providing Trusted Components to the Industry
Sort
View
IEEEARES
2007
IEEE
15 years 3 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter
AAAI
2004
14 years 11 months ago
Performance Bounded Reinforcement Learning in Strategic Interactions
Despite increasing deployment of agent technologies in several business and industry domains, user confidence in fully automated agent driven applications is noticeably lacking. T...
Bikramjit Banerjee, Jing Peng
AAMAS
2007
Springer
14 years 9 months ago
Generalized multiagent learning with performance bound
Abstract – Despite increasing deployment of agent technologies in several business and industry domains, user confidence in fully automated agent driven applications is noticeab...
Bikramjit Banerjee, Jing Peng
CORR
2006
Springer
81views Education» more  CORR 2006»
14 years 9 months ago
The emergence of knowledge exchange: an agent-based model of a software market
Abstract--We investigate knowledge exchange among commercial organizations, the rationale behind it, and its effects on the market. Knowledge exchange is known to be beneficial for...
Maria Chli, Philippe De Wilde
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan