Sciweavers

1176 search results - page 132 / 236
» Exploiting Online Games
Sort
View
88
Voted
PR
2008
123views more  PR 2008»
14 years 11 months ago
Extensions of vector quantization for incremental clustering
In this paper, we extend the conventional vector quantization by incorporating a vigilance parameter, which steers the tradeoff between plasticity and stability during incremental...
Edwin Lughofer
78
Voted
ICML
2005
IEEE
15 years 11 months ago
A theoretical analysis of Model-Based Interval Estimation
Several algorithms for learning near-optimal policies in Markov Decision Processes have been analyzed and proven efficient. Empirical results have suggested that Model-based Inter...
Alexander L. Strehl, Michael L. Littman
WWW
2006
ACM
15 years 11 months ago
Oyster: sharing and re-using ontologies in a peer-to-peer community
Abstract. This paper presents Oyster, a Peer-to-Peer system for exchanging ontology metadata among communities in the Semantic Web. We describe how Oyster assists researchers in re...
Asunción Gómez-Pérez, Peter H...
91
Voted
ESWS
2009
Springer
15 years 5 months ago
Cupboard - A Place to Expose Your Ontologies to Applications and the Community
In this demo, we present the Cupboard system for ontology publishing, sharing and reuse. This system is intended to support both ontology engineers and ontology users/practitioners...
Mathieu d'Aquin, Holger Lewen
80
Voted
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
15 years 4 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti