Sciweavers

2285 search results - page 342 / 457
» Active Imitation Learning
Sort
View
CEAS
2005
Springer
14 years 3 months ago
Good Word Attacks on Statistical Spam Filters
Unsolicited commercial email is a significant problem for users and providers of email services. While statistical spam filters have proven useful, senders of spam are learning ...
Daniel Lowd, Christopher Meek
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
ICRA
2003
IEEE
160views Robotics» more  ICRA 2003»
14 years 3 months ago
Adapting navigation strategies using motions patterns of people
— As people move through their environments, they do not move randomly. Instead, they are often engaged in typical motion patterns, related to specific locations they might be i...
Maren Bennewitz, Wolfram Burgard, Sebastian Thrun
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
14 years 3 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...
ATAL
2003
Springer
14 years 3 months ago
How to calm hyperactive agents
System performance in multi-agent resource allocation systems can often improve if individual agents reduce their activity. Agents in such systems need a way to modulate their ind...
H. Van Dyke Parunak, Sven Brueckner, Robert S. Mat...