Sciweavers

2092 search results - page 313 / 419
» A Theory of Non-Deterministic Networks
Sort
View
PTS
2008
123views Hardware» more  PTS 2008»
15 years 1 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
MVA
2007
185views Computer Vision» more  MVA 2007»
15 years 1 months ago
An Efficient Method for Human Behavior Identification
This paper presents a recognition method for human behavior identification based on motion history image theory. The motion history image has the advantage that it can record the ...
Fang-Hsuan Cheng, Fu-Tai Chen
AAAI
2006
15 years 1 months ago
Value-Function-Based Transfer for Reinforcement Learning Using Structure Mapping
Transfer learning concerns applying knowledge learned in one task (the source) to improve learning another related task (the target). In this paper, we use structure mapping, a ps...
Yaxin Liu, Peter Stone
ECIS
2001
15 years 1 months ago
Internet Technology Diffusion: Adoption of IPV6
With the explosive growth of the Internet in the 1990s, the scalability of current technologies has become a significant issue. The current version of Internet Protocol version 4 ...
Anat Hovav, Ravi Patnayakuni, David Schuff
EACL
1989
ACL Anthology
15 years 26 days ago
Inference in DATR
DATR is a declarative language for representing a restricted class of inheritance networks, permitting both multiple and default inheritance. The principal intended area of applic...
Roger Evans, Gerald Gazdar