Sciweavers

792 search results - page 128 / 159
» Reading What Machines
Sort
View
KR
2010
Springer
14 years 15 days ago
I Don't Want to Think About it Now: Decision Theory with Costly Computation
Computation plays a major role in decision making. Even if an agent is willing to ascribe a probability to all states and a utility to all outcomes, and maximize expected utility,...
Joseph Y. Halpern
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
IFIP
1999
Springer
13 years 12 months ago
Assessing Instructional Technology
: In a relatively short period of time, educational technology has become a basic component of the instructional life of almost every College or University around the world. The wa...
Lawrence M. Baldwin, Panagiotis Takis Metaxas, Win...
ILP
1999
Springer
13 years 12 months ago
Rule Evaluation Measures: A Unifying View
Numerous measures are used for performance evaluation in machine learning. In predictive knowledge discovery, the most frequently used measure is classification accuracy. With new...
Nada Lavrac, Peter A. Flach, Blaz Zupan
IPPS
1998
IEEE
13 years 12 months ago
Design and Implementation of a Parallel I/O Runtime System for Irregular Applications
In this paper we present the design, implementation and evaluation of a runtime system based on collective I/O techniques for irregular applications. We present two models, namely...
Jaechun No, Sung-Soon Park, Jesús Carretero...