Sciweavers

1792 search results - page 338 / 359
» e-Participation and Decision Analysis
Sort
View
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
ATAL
2009
Springer
15 years 4 months ago
Operational semantics of goal models in adaptive agents
Several agent-oriented software engineering methodologies address the emerging challenges posed by the increasing need of adaptive software. A common denominator of such methodolo...
Mirko Morandini, Loris Penserini, Anna Perini
CIKM
2009
Springer
15 years 4 months ago
Multivariate classification of urine metabolome profiles for breast cancer diagnosis
Background: Diagnosis techniques using urine are non-invasive, inexpensive, and easy to perform in clinical settings. The metabolites in urine, as the end products of cellular pro...
Younghoon Kim, Imhoi Koo, Byung Hwa Jung, Bong Chu...
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
15 years 4 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
ROBOCUP
2009
Springer
134views Robotics» more  ROBOCUP 2009»
15 years 4 months ago
Learning Complementary Multiagent Behaviors: A Case Study
As the reach of multiagent reinforcement learning extends to more and more complex tasks, it is likely that the diverse challenges posed by some of these tasks can only be address...
Shivaram Kalyanakrishnan, Peter Stone