Sciweavers

8501 search results - page 1686 / 1701
» Reactive process networks
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
13 years 9 months ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
JMLR
2008
129views more  JMLR 2008»
13 years 9 months ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári
JSAC
2006
102views more  JSAC 2006»
13 years 9 months ago
A deterministic frequency-domain model for the indoor power line transfer function
The characterization of the transfer function of the power line (PL) channel is a nontrivial task that requires a truly interdisciplinary approach. Until recently, a common attribu...
S. Galli, Thomas C. Banwell
PPL
2008
185views more  PPL 2008»
13 years 9 months ago
On Design and Application Mapping of a Network-on-Chip(NoC) Architecture
As the number of integrated IP cores in the current System-on-Chips (SoCs) keeps increasing, communication requirements among cores can not be sufficiently satisfied using either ...
Jun Ho Bahn, Seung Eun Lee, Yoon Seok Yang, Jungso...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 9 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
« Prev « First page 1686 / 1701 Last » Next »