Sciweavers

548 search results - page 103 / 110
» A New Way to Introduce Knowledge into Reinforcement Learning
Sort
View
JOT
2007
170views more  JOT 2007»
14 years 9 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
ICSE
2012
IEEE-ACM
12 years 12 months ago
Continuous social screencasting to facilitate software tool discovery
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Emerson R. Murphy-Hill
SIAMCOMP
2011
14 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
ENTCS
2007
168views more  ENTCS 2007»
14 years 9 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
CCR
2002
62views more  CCR 2002»
14 years 9 months ago
An enforced inter-admission delay performance-driven connection admission control algorithm
Connection Admission Control (CAC) is an important function in a computer network that supports Quality of Service (QoS). The function of CAC is to decide whether a new connection...
Stanislav Belenki