Sciweavers

1167 search results - page 101 / 234
» policy 2007
Sort
View
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 10 months ago
Dynamic Bandwidth Allocation for Bandwidth Asymmetry Wireless Networks
Abstract— This paper addresses when and how to adjust bandwidth allocations between uplink and downlink in a multi-service wireless network with bandwidth asymmetry under dynamic...
Gang Feng, Xun Yang
SMC
2007
IEEE
102views Control Systems» more  SMC 2007»
15 years 10 months ago
An improved immune Q-learning algorithm
—Reinforcement learning is a framework in which an agent can learn behavior without knowledge on a task or an environment by exploration and exploitation. Striking a balance betw...
Zhengqiao Ji, Q. M. Jonathan Wu, Maher A. Sid-Ahme...
100
Voted
SMC
2007
IEEE
15 years 10 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
ORL
2007
50views more  ORL 2007»
15 years 3 months ago
NP-Hardness of checking the unichain condition in average cost MDPs
The unichain condition requires that every policy in an MDP result in a single ergodic class, and guarantees that the optimal average cost is independent of the initial state. We ...
John N. Tsitsiklis
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...