Sciweavers

400 search results - page 63 / 80
» Reasoning About Hidden Mechanisms
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ATAL
2006
Springer
15 years 1 months ago
A constraint optimization framework for fractured robot teams
In dangerous and uncertain environments initial plans must be revised. Communication failures hamper this replanning. We introduce fractured subteams as a novel formalism for mode...
Mary Koes, Katia P. Sycara, Illah R. Nourbakhsh
GECCO
2006
Springer
181views Optimization» more  GECCO 2006»
15 years 1 months ago
Designing safe, profitable automated stock trading agents using evolutionary algorithms
Trading rules are widely used by practitioners as an effective means to mechanize aspects of their reasoning about stock price trends. However, due to the simplicity of these rule...
Harish Subramanian, Subramanian Ramamoorthy, Peter...
AAAI
2010
14 years 11 months ago
Learning Simulation Control in General Game-Playing Agents
The aim of General Game Playing (GGP) is to create intelligent agents that can automatically learn how to play many different games at an expert level without any human interventi...
Hilmar Finnsson, Yngvi Björnsson
CIIT
2007
195views Communications» more  CIIT 2007»
14 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...