Sciweavers

1486 search results - page 193 / 298
» Firewall Rules Analysis
Sort
View
ECAL
2001
Springer
15 years 8 months ago
Evolution of Reinforcement Learning in Uncertain Environments: Emergence of Risk-Aversion and Matching
Reinforcement learning (RL) is a fundamental process by which organisms learn to achieve a goal from interactions with the environment. Using Artificial Life techniques we derive ...
Yael Niv, Daphna Joel, Isaac Meilijson, Eytan Rupp...
AGTIVE
1999
Springer
15 years 8 months ago
DiTo - A Distribution Tool Based on Graph Rewriting
Abstract. In the paper Support for Design Patterns through Graph Transformation Tools in this volume, we have already outlined the global structure of a tool that allows for the an...
Ansgar Radermacher
METRICS
1999
IEEE
15 years 8 months ago
Function Point Measurement Tool for UML Design Specification
Function point analysis(FPA) was proposedto help measure the size of a computerizedbusiness information system. It is widely used in the actual software development. However, it h...
Takuya Uemura, Shinji Kusumoto, Katsuro Inoue
DAC
1998
ACM
15 years 8 months ago
Adjoint Transient Sensitivity Computation in Piecewise Linear Simulation
This paper presents a general method for computing transient sensitivities using the adjoint method in event driven simulation algorithms that employ piecewise linear device model...
Tuyen V. Nguyen, Anirudh Devgan, Ognen J. Nastov
ATAL
2006
Springer
15 years 7 months ago
TANDEM - a design method for integrating web services into multi-agent systems
This paper introduces a new design method for multi-agent systems (MAS) that incorporate logic programming. The DigitalFriend is an example of a MAS with a built-in logic language...
Steve Goschnick, Sandrine Balbo, Leon Sterling, Ch...