Sciweavers

2328 search results - page 383 / 466
» Component Frameworks - A Case Study
Sort
View
ICCBR
2010
Springer
15 years 8 months ago
Imitating Inscrutable Enemies: Learning from Stochastic Policy Observation, Retrieval and Reuse
In this paper we study the topic of CBR systems learning from observations in which those observations can be represented as stochastic policies. We describe a general framework wh...
Kellen Gillespie, Justin Karneeb, Stephen Lee-Urba...
APVIS
2009
15 years 5 months ago
Visualizing time-varying features with TAC-based distance fields
To analyze time-varying data sets, tracking features over time is often necessary to better understand the dynamic nature of the underlying physical process. Tracking 3D time-vary...
Teng-Yok Lee, Han-Wei Shen
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
SIGMOD
2005
ACM
126views Database» more  SIGMOD 2005»
15 years 10 months ago
Page Quality: In Search of an Unbiased Web Ranking
In a number of recent studies [4, 8] researchers have found that because search engines repeatedly return currently popular pages at the top of search results, popular pages tend ...
Junghoo Cho, Sourashis Roy, Robert Adams
CHARME
2005
Springer
94views Hardware» more  CHARME 2005»
15 years 10 months ago
Verifying Quantitative Properties Using Bound Functions
Abstract. We define and study a quantitative generalization of the traditional boolean framework of model-based specification and verification. In our setting, propositions have...
Arindam Chakrabarti, Krishnendu Chatterjee, Thomas...