Sciweavers

34202 search results - page 6776 / 6841
» The Tera computer system
Sort
View
SNPD
2008
13 years 10 months ago
Effect of Security Increment to Symmetric Data Encryption through AES Methodology
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic ...
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad ...
TREC
2008
13 years 10 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
UAI
2008
13 years 10 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
AAAI
2006
13 years 10 months ago
A BDD-Based Polytime Algorithm for Cost-Bounded Interactive Configuration
Interactive configurators are decision support systems assisting users in selecting values for parameters that respect given constraints. The underlying knowledge can be convenien...
Tarik Hadzic, Henrik Reif Andersen
AAAI
2006
13 years 10 months ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol
« Prev « First page 6776 / 6841 Last » Next »