Sciweavers

4072 search results - page 406 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
DAC
2001
ACM
16 years 5 months ago
A Quick Safari Through the Reconfiguration Jungle
Cost effective systems use specialization to optimize factors such as power consumption, processing throughput, flexibility or combinations thereof. Reconfigurable systems obtain ...
Patrick Schaumont, Ingrid Verbauwhede, Kurt Keutze...
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks
— The dynamic nature of mobile ad hoc networks poses fundamental challenges to the design of service composition schemes that can minimize the effect of service disruptions. Alth...
Shanshan Jiang, Yuan Xue, Douglas C. Schmidt
122
Voted
AAAI
2008
15 years 7 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
AI
2007
Springer
15 years 11 months ago
Adding Local Constraints to Bayesian Networks
When using Bayesian networks, practitioners often express constraints among variables by conditioning a common child node to induce the desired distribution. For example, an ‘orâ...
Mark Crowley, Brent Boerlage, David Poole
JECR
2000
157views more  JECR 2000»
15 years 4 months ago
Optimizing Human-Computer Interaction for the Electronic Commerce Environment
The paper investigates the interaction effects between the search strategy of software agents and the subject's product class knowledge. The experimental study consists of a ...
Rex Eugene Perera