Sciweavers

1683 search results - page 71 / 337
» A Needed Narrowing Strategy
Sort
View
KI
2007
Springer
14 years 4 months ago
Making a Robot Learn to Play Soccer Using Reward and Punishment
In this paper, we show how reinforcement learning can be applied to real robots to achieve optimal robot behavior. As example, we enable an autonomous soccer robot to learn interce...
Heiko Müller, Martin Lauer, Roland Hafner, Sa...
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
14 years 3 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
GI
2009
Springer
14 years 2 months ago
A Domain Specific Language for Project Execution Models
: The modeling of strategies for deriving valid project plans is a core task in development process’s design. Strategies are used for planning and for the validation of concrete ...
Eugen Wachtel, Marco Kuhrmann, Georg Kalus
ARVLSI
1997
IEEE
96views VLSI» more  ARVLSI 1997»
14 years 2 months ago
Circuits and Microarchitecture for Gigahertz VLSI Designs
IBM founded the Austin Research Laboratory to investigate high-performance microprocessorbased systems. Initial e orts have focused on design for high frequency. This resulted in ...
Kevin J. Nowka, H. Peter Hofstee
ICHIM
2001
77views more  ICHIM 2001»
13 years 11 months ago
Networking Historical Sources: A Demand-Side Driven Approach
Many archives have introduced online archival databases in the past few years. However, apart from being independent of place and time, hardly any of these databases make finding ...
Andrea Rosenbusch