Sciweavers

3787 search results - page 661 / 758
» The Use of Agents Techniques on Intelligent Tutoring Systems
Sort
View
DRM
2006
Springer
15 years 5 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ATAL
2006
Springer
15 years 5 months ago
Failures of the VCG mechanism in combinatorial auctions and exchanges
The VCG mechanism is the canonical method for motivating bidders in combinatorial auctions and exchanges to bid truthfully. We study two related problems concerning the VCG mechan...
Vincent Conitzer, Tuomas Sandholm
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 2 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 7 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
107
Voted
KES
2004
Springer
15 years 7 months ago
Multi-agent Web Recommendation Method Based on Indirect Association Rules
Recommendation systems often use association rules as main technique to discover useful links among the set of transactions, especially web usage data – historical user sessions....
Przemyslaw Kazienko