Sciweavers

65 search results - page 2 / 13
» re 1998
Sort
View
JSA
1998
94views more  JSA 1998»
13 years 6 months ago
Trading computing power with ReGTime
ReGTime1 (Rent Giga ops someTimes) is a software package for an envisioned \computing power market". ReGTime helps customers to search for providers who allow their workstati...
Bernd Dreier, Annja Huber, Theo Ungerer, Markus Za...
ICML
1998
IEEE
14 years 7 months ago
RL-TOPS: An Architecture for Modularity and Re-Use in Reinforcement Learning
This paper introduces the RL-TOPs architecture for robot learning, a hybrid system combining teleo-reactive planning and reinforcement learning techniques. The aim of this system ...
Malcolm R. K. Ryan, Mark D. Pendrith
NDSS
2005
IEEE
14 years 18 days ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
AMAI
1998
Springer
13 years 6 months ago
Generalization and Specialization Strategies for Learning r.e. Languages
Overgeneralization is a major issue in the identification of grammars for formal languages from positive data. Different formulations of generalization and specialization strate...
Sanjay Jain, Arun Sharma
INFOCOM
1998
IEEE
13 years 11 months ago
Performance Bounds for Dynamic Channel Assignment Schemes Operating under Varying Re-Use Constraints
-We derive bounds for the performance of dynamic channel assignment (DCA) schemeswhich strengthenthe existing Erlang bound. The construction of the bounds is based on a reward para...
Philip A. Whiting, Sem C. Borst