Sciweavers

656 search results - page 109 / 132
» Complexity of finite-horizon Markov decision process problem...
Sort
View
100
Voted
ISF
2007
119views more  ISF 2007»
15 years 1 months ago
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Peter Goldschmidt
134
Voted
CODES
2009
IEEE
15 years 5 months ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross
CVPR
2008
IEEE
15 years 8 months ago
The statistical modelling of fingerprint minutiae distribution with implications for fingerprint individuality studies
The spatial distribution of fingerprint minutiae is a core problem in the fingerprint individuality study, the cornerstone of the fingerprint authentication technology. Previously...
Jiansheng Chen, Yiu Sang Moon
116
Voted
ICMCS
1997
IEEE
117views Multimedia» more  ICMCS 1997»
15 years 6 months ago
Cooperative QoS Management for Multimedia Applications
Quality of Service (QoS) management becomes more and more important, especially in networks where many applications are competing for a limited number of resources. As these appli...
Stefan Fischer, Abdelhakim Hafid, Gregor von Bochm...
GECCO
2005
Springer
108views Optimization» more  GECCO 2005»
15 years 7 months ago
Some theoretical results about the computation time of evolutionary algorithms
This paper focuses on the computation time of evolutionary algorithms. First, some exact expressions of the mean first hitting times of general evolutionary algorithms in finite...
Lixin X. Ding, Jinghu Yu