Sciweavers

3481 search results - page 514 / 697
» Exploration in Relational Worlds
Sort
View
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 11 months ago
Autonomous blimp control using model-free reinforcement learning in a continuous state and action space
— In this paper, we present an approach that applies the reinforcement learning principle to the problem of learning height control policies for aerial blimps. In contrast to pre...
Axel Rottmann, Christian Plagemann, Peter Hilgers,...
113
Voted
ISCAS
2007
IEEE
84views Hardware» more  ISCAS 2007»
15 years 11 months ago
System Bandwidth Analysis of Multiview Video Coding with Precedence Constraint
— Multiview video coding (MVC) systems require much more bandwidth and computational complexity relative to mono-view video systems. Thus, when designing a VLSI architecture for ...
Pei-Kuei Tsung, Li-Fu Ding, Wei-Yin Chen, Shao-Yi ...
KBSE
2007
IEEE
15 years 11 months ago
The business case for automated software engineering
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
148
Voted
NCA
2007
IEEE
15 years 11 months ago
Implementing Atomic Data through Indirect Learning in Dynamic Networks
Developing middleware services for dynamic distributed systems, e.g., ad-hoc networks, is a challenging task given that such services deal with dynamically changing membership and...
Kishori M. Konwar, Peter M. Musial, Nicolas C. Nic...
141
Voted
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai