Sciweavers

11376 search results - page 2236 / 2276
» Willow System Demonstration
Sort
View
BLISS
2009
IEEE
14 years 2 days ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
ATAL
2010
Springer
14 years 2 days ago
Combining manual feedback with subsequent MDP reward signals for reinforcement learning
As learning agents move from research labs to the real world, it is increasingly important that human users, including those without programming skills, be able to teach agents de...
W. Bradley Knox, Peter Stone
ECAI
2010
Springer
14 years 2 days ago
Learning When to Use Lazy Learning in Constraint Solving
Abstract. Learning in the context of constraint solving is a technique by which previously unknown constraints are uncovered during search and used to speed up subsequent search. R...
Ian P. Gent, Christopher Jefferson, Lars Kotthoff,...
CONEXT
2009
ACM
14 years 2 days ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...
CONEXT
2009
ACM
14 years 2 days ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
« Prev « First page 2236 / 2276 Last » Next »