Sciweavers

520 search results - page 20 / 104
» Playing to Retain the Advantage
Sort
View
ICML
1995
IEEE
14 years 10 months ago
Residual Algorithms: Reinforcement Learning with Function Approximation
A number of reinforcement learning algorithms have been developed that are guaranteed to converge to the optimal solution when used with lookup tables. It is shown, however, that ...
Leemon C. Baird III
GLOBECOM
2007
IEEE
14 years 3 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CNSR
2006
IEEE
138views Communications» more  CNSR 2006»
14 years 3 months ago
MPLS-based Multicast Shared Trees
Abstract— This paper presents a study of our proposed architecture for the setup of a MultiPoint-to-MultiPoint (MP2MP) Label Switched Path (LSP). This form of LSP is needed for e...
Ashraf Matrawy, Wei Yi, Ioannis Lambadaris, Chung-...
BMCV
2000
Springer
14 years 1 months ago
A New Line Segment Grouping Method for Finding Globally Optimal Line Segments
In this paper we propose a new method for extracting line segments from edge images. Our method basically follows a line segment grouping approach. This approach has many advantage...
Jeong-Hun Jang, Ki-Sang Hong
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 11 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...