Sciweavers

1701 search results - page 181 / 341
» Computer Science and State Machines
Sort
View
IWLCS
2005
Springer
15 years 3 months ago
Counter Example for Q-Bucket-Brigade Under Prediction Problem
Aiming to clarify the convergence or divergence conditions for Learning Classifier System (LCS), this paper explores: (1) an extreme condition where the reinforcement process of ...
Atsushi Wada, Keiki Takadama, Katsunori Shimohara
83
Voted
ENTCS
2006
142views more  ENTCS 2006»
14 years 10 months ago
Specialization of Interaction Protocols in a Temporal Action Logic
Temporal logics are well suited for the specification and verification of systems of communicating agents. In this paper we adopt a social approach to agent communication, where c...
Laura Giordano, Alberto Martelli, Camilla Schwind

Publication
7756views
16 years 9 months ago
A New Grey-Scale Template Image Matching Algorithm Using the Cross-Sectional Histogram Correlation Method
A new correlation technique for Grey-Scale Template Image Matching, the Cross-Sectional Histogram Correlation (CHC) Method, is proposed. In comparison to the traditional, widely-us...
Ryo Takei
92
Voted
CHI
2008
ACM
15 years 10 months ago
"Seeing like a rover": embodied experience on the mars exploration rover mission
Although they work with two non-humanoid robots located several million miles away, the distributed team that operates the Mars Exploration Rovers demonstrates an uncanny sympathy...
Janet Vertesi
71
Voted
WEBI
2005
Springer
15 years 3 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu