Sciweavers

589 search results - page 118 / 118
» Evaluating mobile phones as risk information providers
Sort
View
AAAI
2006
13 years 9 months ago
Action Selection in Bayesian Reinforcement Learning
My research attempts to address on-line action selection in reinforcement learning from a Bayesian perspective. The idea is to develop more effective action selection techniques b...
Tao Wang
ICWS
2009
IEEE
14 years 4 months ago
Scalable and Reliable Location Services through Decentralized Replication
—One of the critical challenges for service oriented computing systems is the capability to guarantee scalable and reliable service provision. This paper presents Reliable GeoGri...
Gong Zhang, Ling Liu, Sangeetha Seshadri, Bhuvan B...
ICPADS
2008
IEEE
14 years 2 months ago
UDB: Using Directional Beacons for Localization in Underwater Sensor Networks
Underwater Sensor Networks (UWSN) are widely used in many applications, such as oceanic resource exploration, pollution monitoring, tsunami warnings and mine reconnaissance. In UW...
Hanjiang Luo, Yiyang Zhao, Zhongwen Guo, Siyuan Li...
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu