Sciweavers

85 search results - page 10 / 17
» Knowledge Granularity and Action Selection
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 8 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
RTS
2008
119views more  RTS 2008»
13 years 7 months ago
Symbolic quality control for multimedia applications
We present a fine grain quality control method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions a...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...
SIGIR
2008
ACM
13 years 7 months ago
Task-aware search personalization
Search personalization has been pursued in many ways, in order to provide better result rankings and better overall search experience to individual users [5]. However, blindly app...
Julia Luxenburger, Shady Elbassuoni, Gerhard Weiku...
EUROCAST
2007
Springer
182views Hardware» more  EUROCAST 2007»
14 years 2 months ago
A k-NN Based Perception Scheme for Reinforcement Learning
Abstract a paradigm of modern Machine Learning (ML) which uses rewards and punishments to guide the learning process. One of the central ideas of RL is learning by “direct-online...
José Antonio Martin H., Javier de Lope Asia...
AI
2008
Springer
14 years 2 months ago
Use of Fuzzy Histograms to Model the Spatial Distribution of Objects in Case-Based Reasoning
Abstract. In the context of the RoboCup Simulation League, we describe a new representation of a software agent’s visual perception (“scene”), well suited for case-based reas...
Alan Davoust, Michael W. Floyd, Babak Esfandiari