Sciweavers

860 search results - page 104 / 172
» Biased Random Walks
Sort
View
ISW
2007
Springer
15 years 4 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk
GECCO
2004
Springer
15 years 3 months ago
Shortcomings with Tree-Structured Edge Encodings for Neural Networks
In evolutionary algorithms a common method for encoding neural networks is to use a tree-structured assembly procedure for constructing them. Since node operators have difficulties...
Gregory Hornby
ATS
2000
IEEE
145views Hardware» more  ATS 2000»
15 years 2 months ago
Compaction-based test generation using state and fault information
We present a new test generation procedure for sequential circuits using newly traversed state and newly detected fault information obtained between successive iterations of vecto...
Ashish Giani, Shuo Sheng, Michael S. Hsiao, Vishwa...
ATAL
2006
Springer
15 years 1 months ago
Probabilistic policy reuse in a reinforcement learning agent
We contribute Policy Reuse as a technique to improve a reinforcement learning agent with guidance from past learned similar policies. Our method relies on using the past policies ...
Fernando Fernández, Manuela M. Veloso
ECML
2006
Springer
15 years 1 months ago
Active Learning with Irrelevant Examples
Abstract. Active learning algorithms attempt to accelerate the learning process by requesting labels for the most informative items first. In real-world problems, however, there ma...
Dominic Mazzoni, Kiri Wagstaff, Michael C. Burl