Sciweavers

2372 search results - page 291 / 475
» Probabilistic calling context
Sort
View
130
Voted
COMPSAC
2009
IEEE
15 years 6 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
112
Voted
ECAI
2006
Springer
15 years 6 months ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
107
Voted
ESWS
2006
Springer
15 years 6 months ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...
COMPSAC
2009
IEEE
15 years 5 months ago
Cartesian Programming: The TransLucid Programming Language
Abstract. The TransLucid programming language is a low-level intensional language, designed to be sufficiently rich for it to be the target language for translating the common prog...
John Plaice, Blanca Mancilla
126
Voted
AAAI
2007
15 years 4 months ago
Active Imitation Learning
Imitation learning, also called learning by watching or programming by demonstration, has emerged as a means of accelerating many reinforcement learning tasks. Previous work has s...
Aaron P. Shon, Deepak Verma, Rajesh P. N. Rao