Sciweavers

397 search results - page 79 / 80
» Towards Modeling Other Agents: A Simulation-Based Study
Sort
View
AAAI
2008
13 years 8 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
DAGSTUHL
2007
13 years 7 months ago
Signalling Preferences in Interviewing Markets
The process of match formation in matching markets can be divided into three parts: information sharing, investments in information acquisition, and the formation of matches based...
Robin S. Lee, Michael A. Schwarz
FSTTCS
2008
Springer
13 years 7 months ago
Banach-Mazur Games on Graphs
We survey determinacy, definability, and complexity issues of Banach-Mazur games on finite and infinite graphs. Infinite games where two players take turns to move a token thro...
Erich Grädel
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 7 days ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
13 years 11 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala