Sciweavers

2838 search results - page 509 / 568
» Verifying Controlled Components
Sort
View
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
JSAC
2010
172views more  JSAC 2010»
13 years 7 months ago
Cross-layer QoS-aware communication for ultra wide band wireless multimedia sensor networks
—Wireless Multimedia Sensor Networks (WMSNs) are distributed systems of wirelessly networked devices that allow retrieving video and audio streams, still images, and scalar senso...
Tommaso Melodia, Ian F. Akyildiz
NN
2010
Springer
125views Neural Networks» more  NN 2010»
13 years 7 months ago
Parameter-exploring policy gradients
We present a model-free reinforcement learning method for partially observable Markov decision problems. Our method estimates a likelihood gradient by sampling directly in paramet...
Frank Sehnke, Christian Osendorfer, Thomas Rü...
PERCOM
2010
ACM
13 years 7 months ago
HIP: Health integration platform
—This paper introduces a new software development platform specifically designed for wireless health applications. Wireless health applications follow a unique paradigm encompas...
Jonathan Woodbridge, Hyduke Noshadi, Ani Nahapetia...
PVLDB
2010
151views more  PVLDB 2010»
13 years 7 months ago
Scalable Discovery of Best Clusters on Large Graphs
The identification of clusters, well-connected components in a graph, is useful in many applications from biological function prediction to social community detection. However, ...
Kathy Macropol, Ambuj K. Singh