Sciweavers

17018 search results - page 3365 / 3404
» From the How to the What
Sort
View
JTAER
2010
135views more  JTAER 2010»
13 years 7 months ago
Developing Trust In Virtual Software Development Teams
Today globally distributed software development has become the norm for many organizations and the popularity of implementing such an approach continues to increase. In these circ...
Valentine Casey
JUCS
2010
124views more  JUCS 2010»
13 years 7 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 7 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
MP
2010
119views more  MP 2010»
13 years 7 months ago
Efficient and fair routing for mesh networks
Inspired by the One Laptop Per Child project, we consider mesh networks that connect devices that cannot recharge their batteries easily. We study how the mesh should retransmit in...
Andrea Lodi, Enrico Malaguti, Nicolás E. St...
NECO
2010
103views more  NECO 2010»
13 years 7 months ago
Posterior Weighted Reinforcement Learning with State Uncertainty
Reinforcement learning models generally assume that a stimulus is presented that allows a learner to unambiguously identify the state of nature, and the reward received is drawn f...
Tobias Larsen, David S. Leslie, Edmund J. Collins,...
« Prev « First page 3365 / 3404 Last » Next »