Sciweavers

7200 search results - page 1207 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
AAAI
1998
14 years 3 days ago
Applying Online Search Techniques to Continuous-State Reinforcement Learning
In this paper, we describe methods for e ciently computing better solutions to control problems in continuous state spaces. We provide algorithms that exploit online search to boo...
Scott Davies, Andrew Y. Ng, Andrew W. Moore
VMV
2003
99views Visualization» more  VMV 2003»
14 years 3 days ago
Resampling of Large Datasets for Industrial Flow Visualization
Many industrial flow simulations calculated in the car development process are defined on unstructured grids. However, visualization of unstructured grids is computationally exp...
Simon Stegmaier, Martin Schulz, Thomas Ertl
WORM
2003
14 years 3 days ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
NIPS
2000
14 years 3 days ago
Processing of Time Series by Neural Circuits with Biologically Realistic Synaptic Dynamics
Experimental data show that biological synapses behave quite differently from the symbolic synapses in common artificial neural network models. Biological synapses are dynamic, i....
Thomas Natschläger, Wolfgang Maass, Eduardo D...
WSC
1998
14 years 2 days ago
Advanced Uses for Micro Saint Simulation Software
Simulation is fast becoming THE software tool for the 1990's. More companies each year are taking advantage of the ease of use of simulation software and see the benefits to ...
Catherine Drury Barnes, K. Ronald Laughery Jr.
« Prev « First page 1207 / 1440 Last » Next »