Sciweavers

887 search results - page 173 / 178
» A Time for Choosing
Sort
View
AIM
2002
13 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
DATAMINE
2002
147views more  DATAMINE 2002»
13 years 9 months ago
Discretization: An Enabling Technique
Discrete values have important roles in data mining and knowledge discovery. They are about intervals of numbers which are more concise to represent and specify, easier to use and ...
Huan Liu, Farhad Hussain, Chew Lim Tan, Manoranjan...
AI
1998
Springer
13 years 9 months ago
Model-Based Average Reward Reinforcement Learning
Reinforcement Learning (RL) is the study of programs that improve their performance by receiving rewards and punishments from the environment. Most RL methods optimize the discoun...
Prasad Tadepalli, DoKyeong Ok
TKDE
1998
122views more  TKDE 1998»
13 years 9 months ago
The Design and Implementation of Seeded Trees: An Efficient Method for Spatial Joins
—Existing methods for spatial joins require pre-existing spatial indices or other precomputation, but such approaches are inefficient and limited in generality. Operand data sets...
Ming-Ling Lo, Chinya V. Ravishankar
OSN
2007
132views more  OSN 2007»
13 years 9 months ago
Intermediate-node-initiation (INI): A generalized signaling framework for optical burst-switched networks
In this paper, we discuss different signaling techniques for optical burst-switched networks. We develop a generalized signaling framework for optical burst-switched networks, whi...
Vinod Vokkarane