Sciweavers

2983 search results - page 530 / 597
» The group marriage problem
Sort
View
IWANN
1999
Springer
14 years 1 months ago
Using Temporal Neighborhoods to Adapt Function Approximators in Reinforcement Learning
To avoid the curse of dimensionality, function approximators are used in reinforcement learning to learn value functions for individual states. In order to make better use of comp...
R. Matthew Kretchmar, Charles W. Anderson
ELPUB
1998
ACM
14 years 1 months ago
Towards an Information-Rich Society? Or an Information-Overloaded One? (Is the Media Becoming More Important Than the Message?)
The rapid growth in all forms of electronic publishing is creating many new problems – both technical and socio-economic. This paper examines some of these from three different ...
T. M. R. Ellis
HT
2007
ACM
14 years 22 days ago
Lesson learnt from a large-scale industrial semantic web application
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills,...
DSN
2004
IEEE
14 years 18 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 16 days ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig