Sciweavers

3108 search results - page 89 / 622
» The Elements of Computer Credibility
Sort
View
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
15 years 9 months ago
Dense and Switched Modular Primitives for Bond Graph Model Design
This paper suggests dense and switched modular primitives for a bond-graph-based GP design framework that automatically synthesizes designs for multi-domain, lumped parameter dynam...
Kisung Seo, Zhun Fan, Jianjun Hu, Erik D. Goodman,...
ISIM
2007
15 years 5 months ago
Transformations from EDOC to EJB by Composition of Mapping Operations
Transformations from the Enterprise Distributed Object Computing (EDOC) to Enterprise JavaBeans (EJB) are examined herein from the point of view of an efficiency characteristic of ...
Dariusz Gall
SIGDIAL
2010
15 years 2 months ago
Don't tell anyone! Two Experiments on Gossip Conversations
The purpose of this study is to get a working definition that matches people's intuitive notion of gossip and is sufficiently precise for computational implementation. We con...
Jenny Brusk, Ron Artstein, David R. Traum
ATAL
2007
Springer
15 years 10 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer
SEMWEB
2004
Springer
15 years 9 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin