Sciweavers

9359 search results - page 1790 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
ANCS
2007
ACM
14 years 22 hour ago
On LID assignment in infiniBand networks
To realize a path in an InfiniBand network, an address, known as Local IDentifier (LID) in the InfiniBand specification, must be assigned to the destination and used in the forwar...
Wickus Nienaber, Xin Yuan, Zhenhai Duan
ATAL
2009
Springer
14 years 20 hour ago
Effective bidding and deal identification for negotiations in highly nonlinear scenarios
Most real-world negotiation scenarios involve multiple, interdependent issues. These scenarios are specially challenging because the agents' utility functions are nonlinear, ...
Ivan Marsá-Maestre, Miguel A. López-...
ATAL
2007
Springer
14 years 18 hour ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
IPSN
2010
Springer
14 years 14 hour ago
Practical modeling and prediction of radio coverage of indoor sensor networks
The robust operation of many sensor network applications depends on deploying relays to ensure wireless coverage. Radio mapping aims to predict network coverage based on a small n...
Octav Chipara, Gregory Hackmann, Chenyang Lu, Will...
CASES
2007
ACM
14 years 14 hour ago
Stack size reduction of recursive programs
For memory constrained environments like embedded systems, optimization for program size is often as important, if not more important, as optimization for execution speed. Commonl...
Stefan Schäckeler, Weijia Shang
« Prev « First page 1790 / 1872 Last » Next »