Sciweavers

5544 search results - page 186 / 1109
» Three Inadequate Models
Sort
View
AICT
2009
IEEE
164views Communications» more  AICT 2009»
14 years 4 months ago
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffi
Abstract: A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of a...
Yasusi Kanada
PKDD
2009
Springer
144views Data Mining» more  PKDD 2009»
14 years 3 months ago
Compositional Models for Reinforcement Learning
Abstract. Innovations such as optimistic exploration, function approximation, and hierarchical decomposition have helped scale reinforcement learning to more complex environments, ...
Nicholas K. Jong, Peter Stone
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 3 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar
ICDAR
2007
IEEE
14 years 3 months ago
Language Models for Handwritten Short Message Services
Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for ins...
Emmanuel Prochasson, Christian Viard-Gaudin, Emman...
ICDCSW
2007
IEEE
14 years 3 months ago
Modeling Data Consistency in Wireless Sensor Networks
— With the rapid growth of wireless sensor systems deployment, data quality has become a critical issue to the success of these applications. In this paper, we first raise the d...
Kewei Sha, Weisong Shi