نتایج جستجو برای: protection agent
تعداد نتایج: 428050 فیلتر نتایج به سال:
This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal ...
Public participation within environmental monitoring may contribute to increasing the knowledge on the state of the environment at the same time it promotes citizens' involvement in environmental protection. However, the use of voluntary collected data is limited due to a lack of confidence in data collection procedures. Additionally, data quality is often unknown and the data are usually dispe...
Over the course of the 20th century, the electrical power systems of industrialized economies have become one of the most complex systems created by mankind. A number of ongoing trends will drastically change the way this critical infrastructure is operated. Demand for electricity keeps growing while the controllability of generation capacity is decreasing due to introduction of renewable energ...
To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses “reference states” to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper examines this class of mechanisms and presents the bandwidth of the achieved protection. First, the notion of referenc...
Usage in the domain of multi-agent systems has evolved so as to integrate human users more closely in the applications. Manipulation of private information by autonomous agents has then called for an adapted protection of personal data. This work first examines the legal context of privacy protection and the various computing methods aiming at personal data protection. Surveys show a significan...
ing away from certain complications that we explore in subsequent sections, we derive the meaning in (102b) for the the copy raising example in (102a) and the meaning in (103b) for the related perceptual resemblance example in (103a): (102) a. John seems to me like he’s upset. b. ∃s .seem(s , upset(john)) ∧ PSOURCE = john ∧ PGOAL = speaker (103) a. John sounds to me like he’s upset. b. ∃s .soun...
Protecting critical infrastructures, such as electrical power grids, has become a significant concern for many nation states in recent years. Increasing attention is being given to the problem of infrastructure modeling, in order to help identify and redress potential vulnerabilities. Understanding critical infrastructure behavior involves modeling not only individual infrastructures, but also ...
Introduction Large-scale irrigation systems are central to the socio-economic development in developing countries. The systems not only support the livelihood of farmers who rely on them to water their crops, but also determine the amount of resources that the agricultural sector can generate to fuel industrial development in urban areas (Small and Svendsen 1992). In the last few decades, due t...
این پایان نامه به بررسی نقش مثبت یا منفی احساسات روی کارایی عامل های یادگیرنده در یک محیط multi-agent می پردازد. در این راستا مدلی برای عامل های یادگیرنده دارای احساس معرفی می شود. برای بررسی نقش احساسات، یک محیط فرضی multi-agent شبیه سازی شده و حالت های گوناگونی در آن نظر گرفته می شوند. در حالت نخست، کارایی عامل هایی بررسی می شود که دارای احساس نیستند و فقط قابلیت یادگیری دارند. در دومین حالت...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید