Sciweavers

1401 search results - page 257 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
AI
1999
Springer
13 years 8 months ago
Cooperative Behavior Acquisition for Mobile Robots in Dynamically Changing Real Worlds Via Vision-Based Reinforcement Learning a
In this paper, we first discuss the meaning of physical embodiment and the complexity of the environment in the context of multi-agent learning. We then propose a vision-based rei...
Minoru Asada, Eiji Uchibe, Koh Hosoda
QUESTA
2007
50views more  QUESTA 2007»
13 years 8 months ago
Stability of join-the-shortest-queue networks
This paper investigates stability behavior in a variant of a generalized Jackson queueing network. In our network, some customers use a join-the-shortest-queue policy when enterin...
J. G. Dai, John J. Hasenbein, Bara Kim
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
NIPS
1993
13 years 10 months ago
Using Local Trajectory Optimizers to Speed Up Global Optimization in Dynamic Programming
Dynamic programming provides a methodology to develop planners and controllers for nonlinear systems. However, general dynamic programming is computationally intractable. We have ...
Christopher G. Atkeson
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
14 years 6 days ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...