Sciweavers

934 search results - page 62 / 187
» context 2003
Sort
View
CHI
2003
ACM
14 years 3 months ago
ShownPass: an easy access control with a displayed password
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
NIPS
2003
13 years 11 months ago
Can We Learn to Beat the Best Stock
A novel algorithm for actively trading stocks is presented. While traditional universal algorithms (and technical trading heuristics) attempt to predict winners or trends, our app...
Allan Borodin, Ran El-Yaniv, Vincent Gogan
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
14 years 3 months ago
System Architecture for Cross Border Payment A Case Study for the Financial Services Industry
The financial services industry is changing rapidly as a result of advances in information technology (IT), telecommunications and the Internet. Technological innovations and incr...
Nadia Ayad, Alexander Verbraeck
AAAI
2010
13 years 11 months ago
Relative Entropy Policy Search
Policy search is a successful approach to reinforcement learning. However, policy improvements often result in the loss of information. Hence, it has been marred by premature conv...
Jan Peters, Katharina Mülling, Yasemin Altun
ERCIMDL
2003
Springer
106views Education» more  ERCIMDL 2003»
14 years 3 months ago
Topical Crawling for Business Intelligence
Abstract. The Web provides us with a vast resource for business intelligence. However, the large size of the Web and its dynamic nature make the task of foraging appropriate inform...
Gautam Pant, Filippo Menczer