Sciweavers

495 search results - page 90 / 99
» Constructing States for Reinforcement Learning
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
ICML
2004
IEEE
14 years 8 months ago
Utile distinction hidden Markov models
This paper addresses the problem of constructing good action selection policies for agents acting in partially observable environments, a class of problems generally known as Part...
Daan Wierstra, Marco Wiering
CHI
2008
ACM
14 years 8 months ago
Creativity interventions: physical-digital activities for promoting group creativity
Arizona State University's Arts, Media, and Engineering Program is currently addressing the need to assess the growth of group creativity in trans-disciplinary collaboration....
Lisa M. Tolentino, Aisling Kelliher, David Birchfi...
ATAL
2004
Springer
14 years 1 months ago
QueryTracker: An Agent for Tracking Persistent Information Needs
Most people have long term information interests. Current Web search engines satisfy immediate information needs. Specific sites support tracking of long term interests. We prese...
Gabriel Somlo, Adele E. Howe
ICCSA
2007
Springer
13 years 11 months ago
Modeling a Legged Robot for Visual Servoing
This article presents a contribution to the visual tracking of objects using all the degrees of freedom of an Aibo ERS-7 robot. We approach this issue in a principled way applying ...
Zelmar Echegoyen, Alicia D'Anjou, Manuel Gra&ntild...