Sciweavers

2372 search results - page 291 / 475
» Probabilistic calling context
Sort
View
COMPSAC
2009
IEEE
14 years 3 days ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
ECAI
2006
Springer
13 years 12 months ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
ESWS
2006
Springer
13 years 12 months ago
Modelling Ontology Evaluation and Validation
We present a comprehensive approach to ontology evaluation and validation, which have become a crucial problem for the development of semantic technologies. Existing evaluation met...
Aldo Gangemi, Carola Catenacci, Massimiliano Ciara...
COMPSAC
2009
IEEE
13 years 11 months ago
Cartesian Programming: The TransLucid Programming Language
Abstract. The TransLucid programming language is a low-level intensional language, designed to be sufficiently rich for it to be the target language for translating the common prog...
John Plaice, Blanca Mancilla
AAAI
2007
13 years 10 months ago
Active Imitation Learning
Imitation learning, also called learning by watching or programming by demonstration, has emerged as a means of accelerating many reinforcement learning tasks. Previous work has s...
Aaron P. Shon, Deepak Verma, Rajesh P. N. Rao