Sciweavers

150 search results - page 27 / 30
» Using multi-agent systems for learning optimal policies for ...
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 29 days ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 5 days ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
BMCBI
2006
175views more  BMCBI 2006»
13 years 7 months ago
Parameter estimation for stiff equations of biosystems using radial basis function networks
Background: The modeling of dynamic systems requires estimating kinetic parameters from experimentally measured time-courses. Conventional global optimization methods used for par...
Yoshiya Matsubara, Shinichi Kikuchi, Masahiro Sugi...
ICRA
2008
IEEE
204views Robotics» more  ICRA 2008»
14 years 1 months ago
Active exploration and keypoint clustering for object recognition
— Object recognition is a challenging problem for artificial systems. This is especially true for objects that are placed in cluttered and uncontrolled environments. To challenge...
Gert Kootstra, Jelmer Ypma, Bart de Boer
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
14 years 19 days ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...