Sciweavers

2421 search results - page 415 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICIAP
1995
ACM
14 years 1 months ago
Image Retrieval by Elastic Matching of User Sketches
—Effective image retrieval by content from database requires that visual image properties are used instead of textual labels to properly index and recover pictorial data. Retriev...
Alberto Del Bimbo, Pietro Pala
WSC
2007
14 years 9 days ago
Towards a framework for healthcare simulation
The changing needs of healthcare provision around the world are forcing service designers and decision makers to adopt new tools in design and evaluation of processes. Apart from ...
Tillal Eldabi, Terry Young
OSDI
1996
ACM
13 years 11 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
ICANN
2010
Springer
13 years 11 months ago
Exploring Continuous Action Spaces with Diffusion Trees for Reinforcement Learning
We propose a new approach for reinforcement learning in problems with continuous actions. Actions are sampled by means of a diffusion tree, which generates samples in the continuou...
Christian Vollmer, Erik Schaffernicht, Horst-Micha...
INFSOF
2006
108views more  INFSOF 2006»
13 years 10 months ago
Reaching consensus: A moderated fuzzy web services discovery method
Web services are used for developing and integrating highly distributed and heterogeneous systems in different domains such as e-business, grid services, and e-government systems....
Chun-Lung Huang, Chi-Chun Lo, Kuo-Ming Chao, Muham...