Sciweavers

1209 search results - page 153 / 242
» Universal Algebra and Computer Science
Sort
View
125
Voted
ICML
2004
IEEE
16 years 3 months ago
Using relative novelty to identify useful temporal abstractions in reinforcement learning
lative Novelty to Identify Useful Temporal Abstractions in Reinforcement Learning ?Ozg?ur S?im?sek ozgur@cs.umass.edu Andrew G. Barto barto@cs.umass.edu Department of Computer Scie...
Özgür Simsek, Andrew G. Barto
121
Voted
EACL
2009
ACL Anthology
16 years 3 months ago
Deriving Generalized Knowledge from Corpora Using WordNet Abstraction
ion Benjamin Van Durme, Phillip Michalak and Lenhart K. Schubert Department of Computer Science University of Rochester Rochester, NY 14627, USA Existing work in the extraction of...
Benjamin Van Durme, Phillip Michalak, Lenhart Schu...
104
Voted
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
16 years 3 months ago
Non-malleable Obfuscation
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfus...
Ran Canetti, Mayank Varia
FM
2009
Springer
98views Formal Methods» more  FM 2009»
15 years 9 months ago
Recursive Abstractions for Parameterized Systems
e Abstractions for Parameterized Systems JOXAN JAFFAR and ANDREW E. SANTOSA Department of Computer Science, National University of Singapore Singapore 117590 {joxan,andrews}comp.nu...
Joxan Jaffar, Andrew E. Santosa
97
Voted
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
15 years 9 months ago
Pedagogy and Overview of a Graduate Program in Digital Investigation Management
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Gary C. Kessler, Don Haggerty