Sciweavers

2838 search results - page 409 / 568
» Verifying Controlled Components
Sort
View
ISSA
2008
13 years 12 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
AAAI
2006
13 years 12 months ago
TacTex-05: A Champion Supply Chain Management Agent
Supply chains are ubiquitous in the manufacturing of many complex products. Traditionally, supply chains have been created through the interactions of human representatives of the...
David Pardoe, Peter Stone
WSC
2001
13 years 12 months ago
Simulation application service providing (SIM-ASP)
This paper considers advantages and actual problems of web based simulation systems. Based on a review of environments and languages for web based simulation, some fundamental req...
Thomas Wiedemann
ICONIP
1998
13 years 12 months ago
A Comparison of Learning Transfer in Networks and Humans
Learning transfer is the improvement in performance on one task having learnt a related task. That the degree of transfer is signi cantly greater in humans than other primates and...
Steven Phillips
NIPS
1997
13 years 12 months ago
Reinforcement Learning with Hierarchies of Machines
We present a new approach to reinforcement learning in which the policies considered by the learning process are constrained by hierarchies of partially specified machines. This ...
Ronald Parr, Stuart J. Russell