Sciweavers

2645 search results - page 390 / 529
» Autonomous security for autonomous systems
Sort
View
SIAMREV
2010
110views more  SIAMREV 2010»
14 years 11 months ago
Complex Singularities and the Lorenz Attractor
The Lorenz attractor is one of the best known examples of applied mathematics. However, much of what is known about it is a result of numerical calculations and not of mathematica...
Divakar Viswanath, Sönmez Sahutoglu
ICML
2005
IEEE
16 years 5 months ago
Exploration and apprenticeship learning in reinforcement learning
We consider reinforcement learning in systems with unknown dynamics. Algorithms such as E3 (Kearns and Singh, 2002) learn near-optimal policies by using "exploration policies...
Pieter Abbeel, Andrew Y. Ng
WWW
2008
ACM
16 years 5 months ago
Automatically refining the wikipedia infobox ontology
The combined efforts of human volunteers have recently extracted numerous facts from Wikipedia, storing them as machine-harvestable object-attribute-value triples in Wikipedia inf...
Fei Wu, Daniel S. Weld
CHI
2006
ACM
16 years 4 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
CDC
2008
IEEE
144views Control Systems» more  CDC 2008»
15 years 11 months ago
Rendezvous without coordinates
— We study minimalism in sensing and control by considering a multi-agent system in which each agent moves like a Dubins car and has a limited sensor that reports only the presen...
Jingjin Yu, Steven M. LaValle, Daniel Liberzon