Sciweavers

1414 search results - page 119 / 283
» Combining Intruder Theories
Sort
View
94
Voted
ECIS
2004
15 years 2 months ago
Mobile telecommunications market innovation: the transformation from 2g to 3g
Current research focuses on the dynamics of mobile telecommunications market innovation from the perspectives of technology innovation or service adoption. However,because there i...
Jan Damsgaard, Ping Gao
94
Voted
FLAIRS
2004
15 years 2 months ago
VENUS: A System for Novelty Detection in Video Streams with Learning
Novelty detection in video is a rapidly developing application domain within computer vision. The motivation behind this paper is a learning based framework for detecting novelty ...
Roger S. Gaborski, Vishal S. Vaingankar, Vineet Ch...
103
Voted
CRIWG
2003
15 years 2 months ago
Designing Tailorable Groupware for the Healthcare Domain
Abstract. In this paper we present a theory-based approach to designing tailorable groupware for the healthcare domain. Both literature and empirical data show the need, and diffic...
Robert Slagter, Margit Biemans
95
Voted
NIPS
1994
15 years 2 months ago
Reinforcement Learning with Soft State Aggregation
It is widely accepted that the use of more compact representations than lookup tables is crucial to scaling reinforcement learning (RL) algorithms to real-world problems. Unfortun...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
ALGORITHMICA
2006
77views more  ALGORITHMICA 2006»
15 years 25 days ago
Scalable Parallel Algorithms for FPT Problems
Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems o...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...