Sciweavers

2812 search results - page 484 / 563
» Secrecy in Multiagent Systems
Sort
View
KBS
2007
100views more  KBS 2007»
15 years 1 months ago
A retraining methodology for enhancing agent intelligence
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledg...
Andreas L. Symeonidis, Ioannis N. Athanasiadis, Pe...
AAMAS
1999
Springer
15 years 1 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
TPLP
2002
99views more  TPLP 2002»
15 years 1 months ago
Using Methods of Declarative Logic Programming for Intelligent Information Agents
At present, the search for specific information on the World Wide Web is faced with several problems, which arise on the one hand from the vast number of information sources avail...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...
TROB
2002
127views more  TROB 2002»
15 years 1 months ago
Probabilistic pursuit-evasion games: theory, implementation, and experimental evaluation
We consider the problem of having a team of Unmanned Aerial Vehicles (UAV) and Unmanned Ground Vehicles (UGV) pursue a second team of evaders while concurrently building a map in a...
René Vidal, Omid Shakernia, H. Jin Kim, Dav...
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
14 years 8 months ago
Synchronous rendezvous of very-low-range wireless agents
In this paper, we address the problem of temporal synchronization of a team of mobile agents on a set of rendezvous points defined by the nodes of a bipartite network. In particula...
Michael M. Zavlanos