Sciweavers

156 search results - page 20 / 32
» Random Access to Abstract Data Types
Sort
View
IDA
2005
Springer
14 years 1 months ago
Probabilistic Latent Clustering of Device Usage
Abstract. We investigate an application of Probabilistic Latent Semantics to the problem of device usage analysis in an infrastructure in which multiple users have access to a shar...
Jean-Marc Andreoli, Guillaume Bouchard
PARA
2004
Springer
14 years 25 days ago
Improving the Performance of Large-Scale Unstructured PDE Applications
Abstract. This paper investigates two types of overhead due to duplicated local computations, which are frequently encountered in the parallel software of overlapping domain decomp...
Xing Cai
ML
2008
ACM
152views Machine Learning» more  ML 2008»
13 years 7 months ago
Learning near-optimal policies with Bellman-residual minimization based fitted policy iteration and a single sample path
Abstract. We consider batch reinforcement learning problems in continuous space, expected total discounted-reward Markovian Decision Problems. As opposed to previous theoretical wo...
András Antos, Csaba Szepesvári, R&ea...
AUIC
2006
IEEE
14 years 1 months ago
Virtual planning rooms (ViPR): a 3D visualisation environment for hierarchical information
The Future Operations Centre Analysis Laboratory (FOCAL) at Australia’s Defence Science and Technology Organisation (DSTO) is aimed at exploring new paradigms for situation awar...
Michael Broughton
AUSAI
2003
Springer
14 years 22 days ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho