Sciweavers

292 search results - page 16 / 59
» Exploiting Dead Value Information
Sort
View
ITIIS
2010
138views more  ITIIS 2010»
13 years 2 months ago
Identification of Fuzzy Inference System Based on Information Granulation
In this study, we propose a space search algorithm (SSA) and then introduce a hybrid optimization of fuzzy inference systems based on SSA and information granulation (IG). In comp...
Wei Huang, Lixin Ding, Sung-Kwun Oh, Chang-Won Jeo...
ICML
2005
IEEE
14 years 8 months ago
Bayesian sparse sampling for on-line reward optimization
We present an efficient "sparse sampling" technique for approximating Bayes optimal decision making in reinforcement learning, addressing the well known exploration vers...
Tao Wang, Daniel J. Lizotte, Michael H. Bowling, D...
ICDE
2009
IEEE
198views Database» more  ICDE 2009»
14 years 9 months ago
V*-kNN: An Efficient Algorithm for Moving k Nearest Neighbor Queries
This demonstration program presents the V*-kNN algorithm, an efficient algorithm to process moving k nearest neighbor queries (MkNN). The V*-kNN algorithm is based on a safe-region...
Sarana Nutanong, Rui Zhang, Egemen Tanin, Lars Kul...
FLAIRS
2006
13 years 9 months ago
Intelligent Browsing Assistance for Corporate Knowledge Portals
The management of knowledge, i.e. knowing what is known and the ability to exploit it is a burning issue for most organizations. Though knowledge management has a strong social pe...
Markus Zanker, Sergiu Gordea, Marius-Calin Silaghi
COMCOM
2007
100views more  COMCOM 2007»
13 years 7 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia