Sciweavers

2722 search results - page 506 / 545
» Hastily formed networks
Sort
View
CQRE
1999
Springer
14 years 2 months ago
Electronic Payments: Where Do We Go from Here?
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potentia...
Markus Jakobsson, David M'Raïhi, Yiannis Tsio...
IWANN
1999
Springer
14 years 2 months ago
Using Temporal Neighborhoods to Adapt Function Approximators in Reinforcement Learning
To avoid the curse of dimensionality, function approximators are used in reinforcement learning to learn value functions for individual states. In order to make better use of comp...
R. Matthew Kretchmar, Charles W. Anderson
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 2 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
KIVS
1999
Springer
14 years 2 months ago
Electronic Contracting im Internet
Heute bietet das Internet nicht nur für Großunternehmen sondern auch für kleine Unternehmen Möglichkeiten zur automatisierten Kooperation. Im Bereich des Business-to-Business-...
Michael Merz, Frank Griffel, Marko Boger, Harald W...
DSN
2007
IEEE
14 years 2 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee