Sciweavers

4899 search results - page 736 / 980
» Robust normative systems
Sort
View
GECCO
2005
Springer
135views Optimization» more  GECCO 2005»
15 years 4 months ago
Parameter sweeps for exploring GP parameters
This paper describes our procedure and a software application for conducting large parameter sweep experiments in genetic and evolutionary computation research. Both procedure and...
Michael E. Samples, Jason M. Daida, Matthew J. Byo...
IFIP
2005
Springer
15 years 4 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
ISRR
2005
Springer
130views Robotics» more  ISRR 2005»
15 years 4 months ago
Wave Haptics: Encoderless Virtual Stiffnesses
Haptic rendering commonly implements virtual springs using DC motors with current amplifiers and encoder-based position feedback. In these schemes, quantization, discretization, ...
Günter Niemeyer, Nicola Diolaiti, Neal A. Tan...
NORMAS
2005
Springer
15 years 4 months ago
A Framework for the Design of Self-Regulation of Open Agent-based Electronic Marketplaces
In this paper, we argue that allowing self-interested agents to activate social institutions during run-time can improve the robustness (i.e., stability, cooperation or fairness) ...
Christian S. Hahn, Bettina Fley, Michael Florian
PDCAT
2005
Springer
15 years 4 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang