Sciweavers

1266 search results - page 212 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
GECCO
2006
Springer
133views Optimization» more  GECCO 2006»
14 years 3 days ago
On-line evolutionary computation for reinforcement learning in stochastic domains
In reinforcement learning, an agent interacting with its environment strives to learn a policy that specifies, for each state it may encounter, what action to take. Evolutionary c...
Shimon Whiteson, Peter Stone
CORR
2006
Springer
142views Education» more  CORR 2006»
13 years 8 months ago
Social Browsing on Flickr
The new social media sites--blogs, wikis, del.icio.us and Flickr, among others--underscore the transformation of the Web to a participatory medium in which users are actively crea...
Kristina Lerman, Laurie Jones
JIIS
2006
113views more  JIIS 2006»
13 years 8 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 8 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
MOBICOM
2010
ACM
13 years 8 months ago
Directional antenna diversity for mobile devices: characterizations and solutions
We report a first-of-its-kind realization of directional transmission for smartphone-like mobile devices using multiple passive directional antennas, supported by only one RF chai...
Ardalan Amiri Sani, Lin Zhong, Ashutosh Sabharwal