Sciweavers

8499 search results - page 1559 / 1700
» network 2007
Sort
View
ATAL
2007
Springer
14 years 3 months ago
Transfer via inter-task mappings in policy search reinforcement learning
The ambitious goal of transfer learning is to accelerate learning on a target task after training on a different, but related, source task. While many past transfer methods have f...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
ATAL
2007
Springer
14 years 3 months ago
A formal model for situated semantic alignment
Ontology matching is currently a key technology to achieve the semantic alignment of ontological entities used by knowledge-based applications, and therefore to enable their inter...
Manuel Atencia, W. Marco Schorlemmer
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 3 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
CCS
2007
ACM
14 years 3 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
« Prev « First page 1559 / 1700 Last » Next »