Sciweavers

7587 search results - page 1374 / 1518
» Network Analysis and Visualisation
Sort
View
GECCO
2006
Springer
208views Optimization» more  GECCO 2006»
13 years 11 months ago
Comparing evolutionary and temporal difference methods in a reinforcement learning domain
Both genetic algorithms (GAs) and temporal difference (TD) methods have proven effective at solving reinforcement learning (RL) problems. However, since few rigorous empirical com...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
13 years 11 months ago
Memory-Based Face Recognition for Visitor Identification
We show that a simple, memory-based technique for appearance-based face recognition, motivated by the realworld task of visitor identification, can outperform more sophisticated a...
Terence Sim, Rahul Sukthankar, Matthew D. Mullin, ...
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
IDEAL
2000
Springer
13 years 11 months ago
Quantization of Continuous Input Variables for Binary Classification
Quantization of continuous variables is important in data analysis, especially for some model classes such as Bayesian networks and decision trees, which use discrete variables. Of...
Michal Skubacz, Jaakko Hollmén
GIS
1995
ACM
13 years 11 months ago
Object-Oriented Requirements Engineering for GIS Applications
We stress the importance of requirements engineering (RE) for the development of large scale software in general and for GIS-applications in particular. RE analyses the problem do...
Georg Kösters, Bernd-Uwe Pagel, Hans-Werner S...
« Prev « First page 1374 / 1518 Last » Next »