Sciweavers

759 search results - page 131 / 152
» What Can Be Implemented Anonymously
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 10 months ago
Neuroevolutionary optimization
Temporal difference methods are theoretically grounded and empirically effective methods for addressing reinforcement learning problems. In most real-world reinforcement learning ...
Eva Volná
CN
2006
64views more  CN 2006»
13 years 10 months ago
Piggybacking related domain names to improve DNS performance
In this paper, we present a novel approach to exploit the relationships among domain names to improve the cache hit rate for a local DNS server. Using these relationships, an auth...
Hao Shang, Craig E. Wills
COMCOM
2006
121views more  COMCOM 2006»
13 years 10 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
AIL
2005
99views more  AIL 2005»
13 years 9 months ago
Persuasion Dialogue in Online Dispute Resolution
In this paper we show how dialogue-based theories of argumentation can contribute to the construction of effective systems of dispute resolution. Specifically we consider the role ...
Douglas Walton, David M. Godden
TIT
2008
95views more  TIT 2008»
13 years 9 months ago
Error Exponent Regions for Gaussian Broadcast and Multiple-Access Channels
In modern communication systems, different users have different requirements for quality of service (QoS). In this work, QoS refers to the average codeword error probability experi...
Lihua Weng, S. Sandeep Pradhan, Achilleas Anastaso...