Sciweavers

437 search results - page 69 / 88
» Policy Gradient Critics
Sort
View
GECCO
2009
Springer
124views Optimization» more  GECCO 2009»
14 years 1 months ago
Reinforcement learning for games: failures and successes
We apply CMA-ES, an evolution strategy with covariance matrix adaptation, and TDL (Temporal Difference Learning) to reinforcement learning tasks. In both cases these algorithms se...
Wolfgang Konen, Thomas Bartz-Beielstein
CCS
2001
ACM
14 years 1 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
IPPS
1999
IEEE
14 years 1 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
ISCA
1998
IEEE
124views Hardware» more  ISCA 1998»
14 years 1 months ago
Threaded Multiple Path Execution
This paper presents Threaded Multi-Path Execution (TME), which exploits existing hardware on a Simultaneous Multithreading (SMT) processor to speculatively execute multiple paths ...
Steven Wallace, Brad Calder, Dean M. Tullsen
ER
2009
Springer
316views Database» more  ER 2009»
14 years 24 days ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....