Sciweavers

7988 search results - page 262 / 1598
» A Useful Undecidable Theory
Sort
View
91
Voted
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
15 years 6 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
87
Voted
JCS
2000
148views more  JCS 2000»
15 years 18 days ago
Using Sample Size to Limit Exposure to Data Mining
Data mining introduces new problems in database security. The basic problem of using non-sensitive data to infer sensitive data is made more difficult by the "prob abilistic&...
Chris Clifton
82
Voted
ICIP
2005
IEEE
16 years 2 months ago
Gray-scale image enhancement using the SMQT
This paper explores the Successive Mean Quantization Transform (SMQT) for automatic enhancement of gray-scale images. The transform is in the paper presented using set theory. The...
Mikael Nilsson, Mattias Dahl, Ingvar Claesson
96
Voted
NIPS
2001
15 years 2 months ago
Rates of Convergence of Performance Gradient Estimates Using Function Approximation and Bias in Reinforcement Learning
We address two open theoretical questions in Policy Gradient Reinforcement Learning. The first concerns the efficacy of using function approximation to represent the state action ...
Gregory Z. Grudic, Lyle H. Ungar
ICMAS
2000
15 years 2 months ago
The Adaptive Agent Architecture: Achieving Fault-Tolerance Using Persistent Broker Teams
Brokers are used in many multi-agent systems for locating agents, for routing and sharing information, for managing the system, and for legal purposes, as independent third partie...
Sanjeev Kumar, Philip R. Cohen, Hector J. Levesque