Sciweavers

1352 search results - page 213 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AEI
2006
108views more  AEI 2006»
13 years 9 months ago
Grammatical rules for specifying information for automated product data modeling
This paper presents a linguistic framework for developing a formal knowledge acquisition method. The framework is intended to empower domain experts to specify information require...
Ghang Lee, Charles M. Eastman, Rafael Sacks, Shamk...
HICSS
2006
IEEE
163views Biometrics» more  HICSS 2006»
14 years 2 months ago
Learning Ranking vs. Modeling Relevance
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
Dmitri Roussinov, Weiguo Fan
ATAL
2007
Springer
14 years 26 days ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
ATAL
2010
Springer
13 years 10 months ago
An architecture for modular distributed simulation with agent-based models
Agent-based simulations are an increasingly popular means of exploring and understanding complex social systems. In order to be useful, these simulations must capture a range of a...
David Scerri, Alexis Drogoul, Sarah L. Hickmott, L...
CODES
2005
IEEE
14 years 2 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...