Sciweavers

12536 search results - page 2398 / 2508
» Cardinality Networks and Their Applications
Sort
View
USENIX
2008
15 years 6 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
CSCW
2008
ACM
15 years 5 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
ESANN
2007
15 years 5 months ago
How to process uncertainty in machine learning?
Uncertainty is a popular phenomenon in machine learning and a variety of methods to model uncertainty at different levels has been developed. The aim of this paper is to motivate ...
Barbara Hammer, Thomas Villmann
184
Voted
ESANN
2008
15 years 5 months ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
129
Voted
ICWSM
2008
15 years 5 months ago
StoryUpgrade: Finding Stories in Internet Weblogs
The phenomenal rise of Internet weblogging has created new opportunities for people to tell personal stories of their life experience, and the potential to share these stories wit...
Andrew S. Gordon, Reid Swanson
« Prev « First page 2398 / 2508 Last » Next »