Sciweavers

3638 search results - page 36 / 728
» Distribution chain security
Sort
View
ICML
2010
IEEE
13 years 8 months ago
Finite-Sample Analysis of LSTD
In this paper we consider the problem of policy evaluation in reinforcement learning, i.e., learning the value function of a fixed policy, using the least-squares temporal-differe...
Alessandro Lazaric, Mohammad Ghavamzadeh, Ré...
GCC
2004
Springer
14 years 1 months ago
Research on an MOM-Based Service Flow Management System
Abstract. Workflow is an important approach for the specification and management of complex processing tasks. This approach is especially powerful for utilizing distributed service...
Pingpeng Yuan, Hai Jin, Li Qi, Shicai Li
SAC
2010
ACM
13 years 6 months ago
Importance tempering
Simulated tempering (ST) is an established Markov Chain Monte Carlo (MCMC) methodology for sampling from a multimodal density π(θ). The technique involves introducing an auxilia...
Robert B. Gramacy, Richard Samworth, Ruth King
CCS
2011
ACM
12 years 7 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
PDCAT
2007
Springer
14 years 1 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling