Sciweavers

1149 search results - page 174 / 230
» What Are Iteration Theories
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 7 days ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ICML
1994
IEEE
14 years 6 days ago
Learning Without State-Estimation in Partially Observable Markovian Decision Processes
Reinforcement learning (RL) algorithms provide a sound theoretical basis for building learning control architectures for embedded agents. Unfortunately all of the theory and much ...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
EICS
2010
ACM
13 years 10 months ago
Xplain: an editor for building self-explanatory user interfaces by model-driven engineering
Modern User Interfaces (UI) must deal with the increasing complexity of applications in terms of functionality as well as new properties as plasticity. The plasticity of a UI deno...
Alfonso García Frey, Gaëlle Calvary, S...
ATAL
2008
Springer
13 years 10 months ago
A heads-up no-limit Texas Hold'em poker player: discretized betting models and automatically generated equilibrium-finding progr
We present Tartanian, a game theory-based player for headsup no-limit Texas Hold'em poker. Tartanian is built from three components. First, to deal with the virtually infinit...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
CRITICAL
2005
13 years 10 months ago
Comparing two approaches to context: realism and constructivism
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, hav...
Antti Oulasvirta, Sakari Tamminen, Kristina Hö...