Sciweavers

1701 search results - page 181 / 341
» Computer Science and State Machines
Sort
View
IWLCS
2005
Springer
15 years 8 months ago
Counter Example for Q-Bucket-Brigade Under Prediction Problem
Aiming to clarify the convergence or divergence conditions for Learning Classifier System (LCS), this paper explores: (1) an extreme condition where the reinforcement process of ...
Atsushi Wada, Keiki Takadama, Katsunori Shimohara
ENTCS
2006
142views more  ENTCS 2006»
15 years 3 months ago
Specialization of Interaction Protocols in a Temporal Action Logic
Temporal logics are well suited for the specification and verification of systems of communicating agents. In this paper we adopt a social approach to agent communication, where c...
Laura Giordano, Alberto Martelli, Camilla Schwind

Publication
7756views
17 years 2 months ago
A New Grey-Scale Template Image Matching Algorithm Using the Cross-Sectional Histogram Correlation Method
A new correlation technique for Grey-Scale Template Image Matching, the Cross-Sectional Histogram Correlation (CHC) Method, is proposed. In comparison to the traditional, widely-us...
Ryo Takei
CHI
2008
ACM
16 years 3 months ago
"Seeing like a rover": embodied experience on the mars exploration rover mission
Although they work with two non-humanoid robots located several million miles away, the distributed team that operates the Mars Exploration Rovers demonstrates an uncanny sympathy...
Janet Vertesi
WEBI
2005
Springer
15 years 8 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu