Sciweavers

1627 search results - page 157 / 326
» On context in authorization policy
Sort
View
ROBOCUP
2009
Springer
134views Robotics» more  ROBOCUP 2009»
14 years 4 months ago
Learning Complementary Multiagent Behaviors: A Case Study
As the reach of multiagent reinforcement learning extends to more and more complex tasks, it is likely that the diverse challenges posed by some of these tasks can only be address...
Shivaram Kalyanakrishnan, Peter Stone
LION
2007
Springer
192views Optimization» more  LION 2007»
14 years 4 months ago
Learning While Optimizing an Unknown Fitness Surface
This paper is about Reinforcement Learning (RL) applied to online parameter tuning in Stochastic Local Search (SLS) methods. In particular a novel application of RL is considered i...
Roberto Battiti, Mauro Brunato, Paolo Campigotto
OTM
2005
Springer
14 years 3 months ago
Timely Provisioning of Mobile Services in Critical Pervasive Environments
Timeliness in conventional real-time systems is addressed by employing well-known scheduling techniques that guarantee the execution of a number of tasks within certain deadlines. ...
Filippos Papadopoulos, Apostolos Zarras, Evaggelia...
ACSAC
2002
IEEE
14 years 3 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 10 months ago
Power Allocation Games in Wireless Networks of Multi-antenna Terminals
We consider wireless networks that can be modeled by multiple access channels in which all the terminals are equipped with multiple antennas. The propagation model used to account...
Elena Veronica Belmega, Samson Lasaulce, Mé...