Sciweavers

914 search results - page 96 / 183
» Effective vaccination policies
Sort
View
98
Voted
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
15 years 5 months ago
G-8 Collaborative Initiatives and the Digital Divide: Readiness for E-government
At the G-8 Kyushu-Okinawa Summit in July 2000, the industrialized nations acknowledged the advancement of the private sector in information technology (IT) and committed the organ...
Cheryl L. Brown
103
Voted
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 5 months ago
Q-learning and Pontryagin's Minimum Principle
Abstract— Q-learning is a technique used to compute an optimal policy for a controlled Markov chain based on observations of the system controlled using a non-optimal policy. It ...
Prashant G. Mehta, Sean P. Meyn
86
Voted
ACSAC
2000
IEEE
15 years 5 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
WMCSA
1999
IEEE
15 years 4 months ago
TCP Performance in Wireless Multi-hop Networks
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP ...
Mario Gerla, Ken Tang, Rajive Bagrodia
98
Voted
ASWEC
2007
IEEE
15 years 4 months ago
Influence Control for Dynamic Reconfiguration
Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences s...
Zhikun Zhao, Wei Li