نتایج جستجو برای: protection agent

تعداد نتایج: 428050  

Journal: :JIPS 2010
Seong-Hee Bae Jaejoon Kim

This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal ...

Journal: :Journal of environmental management 2004
Cristina Gouveia Alexandra Fonseca António Câmara Francisco Ferreira

Public participation within environmental monitoring may contribute to increasing the knowledge on the state of the environment at the same time it promotes citizens' involvement in environmental protection. However, the use of voluntary collected data is limited due to a lack of confidence in data collection procedures. Additionally, data quality is often unknown and the data are usually dispe...

2010
Koen Kok

Over the course of the 20th century, the electrical power systems of industrialized economies have become one of the most complex systems created by mankind. A number of ongoing trends will drastically change the way this critical infrastructure is operated. Demand for electricity keeps growing while the controllability of generation capacity is decreasing due to introduction of renewable energ...

2000
Fritz Hohl

To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses “reference states” to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper examines this class of mechanisms and presents the bandwidth of the achieved protection. First, the notion of referenc...

2009
Guillaume Piolle

Usage in the domain of multi-agent systems has evolved so as to integrate human users more closely in the applications. Manipulation of private information by autonomous agents has then called for an adapted protection of personal data. This work first examines the legal context of privacy protection and the various computing methods aiming at personal data protection. Surveys show a significan...

2006
Ash Asudeh

ing away from certain complications that we explore in subsequent sections, we derive the meaning in (102b) for the the copy raising example in (102a) and the meaning in (103b) for the related perceptual resemblance example in (103a): (102) a. John seems to me like he’s upset. b. ∃s .seem(s , upset(john)) ∧ PSOURCE = john ∧ PGOAL = speaker (103) a. John sounds to me like he’s upset. b. ∃s .soun...

2004
Dennis Foley Pete Lamb Jennifer Esterly A. Uszok R. Jeffers

Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...

Journal: :CASM 2017
Jingjing Cai Hang Xiong

Introduction Large-scale irrigation systems are central to the socio-economic development in developing countries. The systems not only support the livelihood of farmers who rely on them to water their crops, but also determine the amount of resources that the agricultural sector can generate to fuel industrial development in urban areas (Small and Svendsen 1992). In the last few decades, due t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علم و صنعت ایران - دانشکده مهندسی کامپیوتر 1383

این پایان نامه به بررسی نقش مثبت یا منفی احساسات روی کارایی عامل های یادگیرنده در یک محیط multi-agent می پردازد. در این راستا مدلی برای عامل های یادگیرنده دارای احساس معرفی می شود. برای بررسی نقش احساسات، یک محیط فرضی multi-agent شبیه سازی شده و حالت های گوناگونی در آن نظر گرفته می شوند. در حالت نخست، کارایی عامل هایی بررسی می شود که دارای احساس نیستند و فقط قابلیت یادگیری دارند. در دومین حالت...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید