Sciweavers

6042 search results - page 157 / 1209
» Repeated Observation Models
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 6 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
AIPS
2006
15 years 6 months ago
On Some Tractable Cases of Logical Filtering
Filtering denotes any method whereby an agent updates its belief state--its knowledge of the state of the world--from a sequence of actions and observations. In logical filtering,...
T. K. Satish Kumar, Stuart J. Russell
ACL
1993
15 years 6 months ago
Identifying Relevant Prior Explanations
When human tutors engage in dialogue, they freely exploit allaspects of the mutually known context, including the previous discourse. Utterances that do not draw on previous disco...
James A. Rosenblum
139
Voted
WCE
2007
15 years 5 months ago
A Multi-Agent Approach for Intelligent Traffic-Light Control
—In this paper we propose a multi-agent approach for traffic-light control. According to this approach, our system consists of agents and their world. In this context, the world ...
Visit Hirankitti, Jaturapith Krohkaew, Christopher...
200
Voted
ATAL
2010
Springer
15 years 5 months ago
Role evolution in Open Multi-Agent Systems as an information source for trust
In Open Multi-Agent Systems (OMAS), deciding with whom to interact is a particularly difficult task for an agent, as repeated interactions with the same agents are scarce, and rep...
Ramón Hermoso, Holger Billhardt, Sascha Oss...