— In this article we present results from experiments where a edge detector was learned from scratch by EANT2, a method for evolutionary reinforcement learning. The detector is c...
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Abstract. An agent normative society has to deal with two main concerns: how to define norms and how to enforce them. Enforcement becomes a complex issue as agent societies become...
Adrian Perreau de Pinninck, Carles Sierra, W. Marc...
Abstract. Document triage is the critical point in the information seeking process when the user first decides the relevance of a document to their information need. This complex ...