Sciweavers

948 search results - page 144 / 190
» Analysis of SITA policies
Sort
View
ICML
2005
IEEE
16 years 20 days ago
Proto-value functions: developmental reinforcement learning
This paper presents a novel framework called proto-reinforcement learning (PRL), based on a mathematical model of a proto-value function: these are task-independent basis function...
Sridhar Mahadevan
WWW
2007
ACM
16 years 16 days ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
WWW
2005
ACM
16 years 16 days ago
Guidelines for developing trust in health websites
How do people decide which health websites to trust and which to reject? Thirteen participants all diagnosed with hypertension were invited to search for information and advice re...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...
SIGCSE
2009
ACM
179views Education» more  SIGCSE 2009»
16 years 13 days ago
Methods, metrics and motivation for a green computer science program
Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of techno...
Mujtaba Talebi, Thomas Way
ICSE
2004
IEEE-ACM
15 years 12 months ago
A Feature-Oriented Alternative to Implementing Reliability Connector Wrappers
Connectors and connector wrappers explicitly specify the protocol of interaction among components and afford the reusable application of extra-functional behaviors, such as reliabi...
J. H. Sowell, R. E. Kurt Stirewalt