Sciweavers

1663 search results - page 322 / 333
» Computer Security in the Real World
Sort
View
APVIS
2007
15 years 1 months ago
A comparison of vertex ordering algorithms for large graph visualization
In this study, we examine the use of graph ordering algorithms for visual analysis of data sets using visual similarity matrices. Visual similarity matrices display the relationsh...
Christopher Mueller, Benjamin Martin, Andrew Lumsd...
ESANN
2008
15 years 1 months ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
IUSED
2008
15 years 1 months ago
Preparing Usability Supporting Architectural Patterns for Industrial Use
Usability supporting architectural patterns (USAPs) have been shown to provide developers with useful guidance for producing a software architecture design that supports usability...
Pia Stoll, Bonnie E. John, Len Bass, Elspeth Golde...
IJCAI
2007
15 years 1 months ago
Color Learning on a Mobile Robot: Towards Full Autonomy under Changing Illumination
A central goal of robotics and AI is to be able to deploy an agent to act autonomously in the real world over an extended period of time. It is commonly asserted that in order to ...
Mohan Sridharan, Peter Stone
RIAO
2007
15 years 1 months ago
Capturing Sentence Prior for Query-Based Multi-Document Summarization
In this paper, we have considered a real world information synthesis task, generation of a fixed length multi document summary which satisfies a specific information need. This...
Jagadeesh Jagarlamudi, Prasad Pingali, Vasudeva Va...