Sciweavers

1734 search results - page 206 / 347
» What works
Sort
View
86
Voted
ATAL
2005
Springer
15 years 6 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
DIGRA
2005
Springer
15 years 6 months ago
Girls Creating Games: Challenging Existing Assumptions about Game Content
In a reinforcing cycle, few females create games and fewer girls than boys play games. In this paper, we increase our understanding of what girls like about games and gaming by de...
Jill Denner, Steven Bean, Linda L. Werner
EPIA
2005
Springer
15 years 6 months ago
Reducing Propositional Theories in Equilibrium Logic to Logic Programs
The paper studies reductions of propositional theories in equilibrium logic to logic programs under answer set semantics. Specifically we are concerned with the question of how to...
Pedro Cabalar, David Pearce, Agustín Valver...
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 6 months ago
On the complexity of hierarchical problem solving
Competent Genetic Algorithms can efficiently address problems in which the linkage between variables is limited to a small order k. Problems with higher order dependencies can onl...
Edwin D. de Jong, Richard A. Watson, Dirk Thierens