Sciweavers

6258 search results - page 1057 / 1252
» Applied Text Generation
Sort
View
IJNSEC
2008
145views more  IJNSEC 2008»
15 years 4 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
GPEM
2006
80views more  GPEM 2006»
15 years 4 months ago
Unbounded evolutionary dynamics in a system of agents that actively process and transform their environment
Abstract. Bedau et al.'s statistical classification system for long-term evolutionary dynamics provides a test for open-ended evolution. Making this test more rigorous, and pa...
Alastair Channon
141
Voted
IJRR
2008
186views more  IJRR 2008»
15 years 4 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...
COMCOM
2007
136views more  COMCOM 2007»
15 years 4 months ago
A Delaunay Triangulation based method for wireless sensor network deployment
To obtain a satisfied performance of wireless sensor network, an adaptable sensor deployment method for various applications is essential. In this paper, we propose a centralized ...
Chun-Hsien Wu, Kuo-Chuan Lee, Yeh-Ching Chung
ISCI
2008
181views more  ISCI 2008»
15 years 4 months ago
Attribute reduction in decision-theoretic rough set models
Rough set theory can be applied to rule induction. There are two different types of classification rules, positive and boundary rules, leading to different decisions and consequen...
Yiyu Yao, Yan Zhao
« Prev « First page 1057 / 1252 Last » Next »