Sciweavers

4163 search results - page 94 / 833
» Enhancing surgical systems
Sort
View
152
Voted
ICWSM
2009
15 years 1 months ago
A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items
A particularly challenging task for recommender systems (RSs) is deciding whether to recommend an item that received a variety of high and low scores from its users. RSs that inco...
Patricia Victor, Chris Cornelis, Martine De Cock, ...
CDC
2010
IEEE
139views Control Systems» more  CDC 2010»
14 years 10 months ago
Q-learning and enhanced policy iteration in discounted dynamic programming
We consider the classical finite-state discounted Markovian decision problem, and we introduce a new policy iteration-like algorithm for finding the optimal state costs or Q-facto...
Dimitri P. Bertsekas, Huizhen Yu
108
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
114
Voted
DFT
2008
IEEE
86views VLSI» more  DFT 2008»
15 years 10 months ago
Enhancing Silicon Debug via Periodic Monitoring
Scan-based debug methods give high observability of internal signals, however, they require halting the system to scan out responses from the circuit-under-debug (CUD). This is ti...
Joon-Sung Yang, Nur A. Touba
113
Voted
IAT
2008
IEEE
15 years 10 months ago
Exploiting Hyponymy in Extracting Relations and Enhancing Ontologies
Relation extraction systems typically rely on local lexical and syntactic features as evidence. Recent work suggests that for a given relation, there might exist certain patterns ...
Bhushan Mandhani, Stephen Soderland