Sciweavers

4544 search results - page 806 / 909
» Reinforcement Learning with Time
Sort
View
IJRR
2008
113views more  IJRR 2008»
13 years 10 months ago
Flying Fast and Low Among Obstacles: Methodology and Experiments
Safe autonomous flight is essential for widespread acceptance of aircraft that must fly close to the ground. We have developed a methodology of collision avoidance that can be use...
Sebastian Scherer, Sanjiv Singh, Lyle Chamberlain,...
IJVR
2008
140views more  IJVR 2008»
13 years 10 months ago
Modelling Autonomous Virtual Agent Behaviours in a Virtual Environment for Risk
Our research deals with the design of a training system to support decision-making in the preparation and the management of maintenance interventions in high-risk industries namely...
Lydie Edward, Domitile Lourdeaux, Jean-Paul A. Bar...
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 10 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
CLEIEJ
2007
152views more  CLEIEJ 2007»
13 years 10 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 10 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal