Sciweavers

925 search results - page 137 / 185
» Typing Component-Based Communication Systems
Sort
View
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
14 years 11 months ago
Multi-agent task allocation: learning when to say no
This paper presents a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Exper...
Adam Campbell, Annie S. Wu, Randall Shumaker
IJSC
2008
161views more  IJSC 2008»
14 years 10 months ago
Automatic Generation of Gaze and Gestures for Dialogues between Embodied Conversational Agents
In this paper we introduce a system that automatically adds different types of non-verbal behavior to a given dialogue script between two virtual embodied agents. It allows us to t...
Werner Breitfuss, Helmut Prendinger, Mitsuru Ishiz...
IJDAR
2006
102views more  IJDAR 2006»
14 years 10 months ago
Table form document analysis based on the document structure grammar
Structure analysis of table form documents is an important issue because a printed document and even an electronic document do not provide logical structural information but merely...
Akira Amano, Naoki Asada, Masayuki Mukunoki, Masah...
SIGCOMM
2006
ACM
15 years 3 months ago
Building an AS-topology model that captures route diversity
An understanding of the topological structure of the Internet is needed for quite a number of networking tasks, e.g., making decisions about peering relationships, choice of upstr...
Wolfgang Mühlbauer, Anja Feldmann, Olaf Maenn...
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin