Sciweavers

10819 search results - page 1897 / 2164
» Addition and multiplication of sets
Sort
View
131
Voted
UAI
2008
15 years 2 months ago
Dyna-Style Planning with Linear Function Approximation and Prioritized Sweeping
We consider the problem of efficiently learning optimal control policies and value functions over large state spaces in an online setting in which estimates must be available afte...
Richard S. Sutton, Csaba Szepesvári, Alborz...
111
Voted
CSREASAM
2006
15 years 2 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
89
Voted
DICTA
2003
15 years 2 months ago
Extracting Boundaries from Images by Comparing Cooccurrence Matrices
Abstract. This paper describes methods of extracting region boundaries from the frames of an image sequence by combining information from spatial or temporal cooccurrence matrices ...
Astrit Rexhepi, Azriel Rosenfeld
110
Voted
IADIS
2003
15 years 2 months ago
Query-Based Discovering of Popular Changes in WWW
This paper presents the method for retrieving and summarizing changes in topics from online resources. Users often want to know what are the major changes in their areas of intere...
Adam Jatowt, Khoo Khyou Bun, Mitsuru Ishizuka
WICSA
2001
15 years 2 months ago
A Highly-Extensible, XML-Based Architecture Description Language
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Eric M. Dashofy, André van der Hoek, Richar...
« Prev « First page 1897 / 2164 Last » Next »