Sciweavers

670 search results - page 94 / 134
» An Attention Based Focus Control System
Sort
View
SASO
2008
IEEE
14 years 3 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
13 years 3 months ago
Pathologies of temporal difference methods in approximate dynamic programming
Approximate policy iteration methods based on temporal differences are popular in practice, and have been tested extensively, dating to the early nineties, but the associated conve...
Dimitri P. Bertsekas
BROADNETS
2007
IEEE
14 years 3 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee
CHI
2009
ACM
14 years 9 months ago
Resilience through technology adoption: merging the old and the new in Iraq
Little attention has been given to how citizens use technology to be resilient when their country is at war. We report on an ethnographic interview study of how technology was ado...
Gloria Mark, Ban Al-Ani, Bryan Semaan
ICDM
2002
IEEE
105views Data Mining» more  ICDM 2002»
14 years 1 months ago
Empirical Comparison of Various Reinforcement Learning Strategies for Sequential Targeted Marketing
We empirically evaluate the performance of various reinforcement learning methods in applications to sequential targeted marketing. In particular, we propose and evaluate a progre...
Naoki Abe, Edwin P. D. Pednault, Haixun Wang, Bian...