Sciweavers

8658 search results - page 1565 / 1732
» Models of Command and Control
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Self-organization for coordinating decentralized reinforcement learning
Decentralized reinforcement learning (DRL) has been applied to a number of distributed applications. However, one of the main challenges faced by DRL is its convergence. Previous ...
Chongjie Zhang, Victor R. Lesser, Sherief Abdallah
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 10 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
CSIE
2009
IEEE
13 years 10 months ago
An Investigation of Forecasting Critical Spare Parts Requirement
The critical spare parts (CSP) is essential to machine operation, which is also more expensive, have longer purchasing lead time and larger demand variation than non-critical spar...
Fei-Long Chen, Yun-Chin Chen
GG
2010
Springer
13 years 10 months ago
Local Confluence for Rules with Nested Application Conditions
Abstract. Local confluence is an important property in many rewriting and transformation systems. The notion of critical pairs is central for being able to verify local confluence ...
Hartmut Ehrig, Annegret Habel, Leen Lambers, Ferna...
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
« Prev « First page 1565 / 1732 Last » Next »