Sciweavers

292 search results - page 11 / 59
» Exploiting Dead Value Information
Sort
View
MDM
2007
Springer
123views Communications» more  MDM 2007»
14 years 1 months ago
On Relaxing Contextual Preference Queries
Personalization systems exploit preferences for providing users with only relevant data from the huge volume of information that is currently available. We consider preferences th...
Kostas Stefanidis, Evaggelia Pitoura, Panos Vassil...
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 9 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
TOMACS
2010
79views more  TOMACS 2010»
13 years 2 months ago
A stochastic approximation method with max-norm projections and its applications to the Q-learning algorithm
In this paper, we develop a stochastic approximation method to solve a monotone estimation problem and use this method to enhance the empirical performance of the Q-learning algor...
Sumit Kunnumkal, Huseyin Topaloglu
ADAPTIVE
2007
Springer
14 years 1 months ago
User Profiles for Personalized Information Access
Abstract. The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research pr...
Susan Gauch, Mirco Speretta, Aravind Chandramouli,...
ANTSW
2010
Springer
13 years 5 months ago
Positional Communication and Private Information in Honeybee Foraging Models
Honeybees coordinate foraging efforts across vast areas through a complex system of advertising and recruitment. One mechanism for coordination is the waggle dance, a movement patt...
Peter Bailis, Radhika Nagpal, Justin Werfel