Sciweavers

635 search results - page 73 / 127
» Four states are enough!
Sort
View
GECCO
2009
Springer
162views Optimization» more  GECCO 2009»
13 years 7 months ago
Uncertainty handling CMA-ES for reinforcement learning
The covariance matrix adaptation evolution strategy (CMAES) has proven to be a powerful method for reinforcement learning (RL). Recently, the CMA-ES has been augmented with an ada...
Verena Heidrich-Meisner, Christian Igel
EXPERT
2010
145views more  EXPERT 2010»
13 years 7 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
TCOM
2011
118views more  TCOM 2011»
13 years 5 months ago
A Joint Network and Channel Coding Strategy for Wireless Decode-and-Forward Relay Networks
—In this paper, we consider a wireless multicast network with multiple sources, relays, and destinations. We adopt a multi-hop decode-and-forward relay protocol such that two can...
Qiang Li, See Ho Ting, Chin Keong Ho
TSE
2011
180views more  TSE 2011»
13 years 5 months ago
Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
—Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and web applications. These EDS pose a challenge to testing because there are a la...
Renée C. Bryce, Sreedevi Sampath, Atif M. M...