Sciweavers

1887 search results - page 272 / 378
» Clustering with Local Restrictions
Sort
View
ICML
2009
IEEE
15 years 10 months ago
Binary action search for learning continuous-action control policies
Reinforcement Learning methods for controlling stochastic processes typically assume a small and discrete action space. While continuous action spaces are quite common in real-wor...
Jason Pazis, Michail G. Lagoudakis
SOSP
2001
ACM
15 years 6 months ago
Information and Control in Gray-Box Systems
In modern systems, developers are often unable to modify the underlying operating system. To build services in such an environment, we advocate the use of gray-box techniques. Whe...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
IOLTS
2009
IEEE
124views Hardware» more  IOLTS 2009»
15 years 4 months ago
On-line characterization and reconfiguration for single event upset variations
The amount of physical variation among electronic components on a die is increasing rapidly. There is a need for a better understanding of variations in transient fault susceptibil...
Kenneth M. Zick, John P. Hayes
IROS
2009
IEEE
110views Robotics» more  IROS 2009»
15 years 4 months ago
Autonomous indoor helicopter flight using a single onboard camera
— We consider the problem of autonomously flying a helicopter in indoor environments. Navigation in indoor settings poses two major challenges. First, real-time perception and r...
Sai Prashanth Soundararaj, Arvind K. Sujeeth, Ashu...
TPHOL
2009
IEEE
15 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...