Sciweavers

859 search results - page 105 / 172
» The Changing Face of Cryptography
Sort
View
ICIP
2009
IEEE
13 years 7 months ago
Automatic scene relighting for video conferencing
This paper describes a new method to automatically improve scene lighting for video conferencing by learning the photometric mapping between a lower exposure and desired exposure ...
Stephen Mangiat, Jerry Gibson
ICSAP
2010
13 years 7 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
CDC
2010
IEEE
160views Control Systems» more  CDC 2010»
13 years 5 months ago
Adaptive bases for Q-learning
Abstract-- We consider reinforcement learning, and in particular, the Q-learning algorithm in large state and action spaces. In order to cope with the size of the spaces, a functio...
Dotan Di Castro, Shie Mannor
EDOC
2011
IEEE
12 years 10 months ago
Value-Based Service Bundling: A Customer-Supplier Approach
Abstract—Due to future ubiquitous service environments, approaches for dynamic delivery of services face new challenges. Since the web 2.0 gave to customers the change to interac...
Iván S. Razo-Zapata, Pieter De Leenheer, Ja...
ICSE
2012
IEEE-ACM
12 years 15 days ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...