Sciweavers

7228 search results - page 1302 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
SENSYS
2009
ACM
15 years 4 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
KDD
2009
ACM
266views Data Mining» more  KDD 2009»
15 years 4 months ago
OpinionMiner: a novel machine learning system for web opinion mining and extraction
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. Unfortunately, reading through al...
Wei Jin, Hung Hay Ho, Rohini K. Srihari
BPM
2009
Springer
340views Business» more  BPM 2009»
15 years 4 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
ATAL
2009
Springer
15 years 4 months ago
An empirical analysis of value function-based and policy search reinforcement learning
In several agent-oriented scenarios in the real world, an autonomous agent that is situated in an unknown environment must learn through a process of trial and error to take actio...
Shivaram Kalyanakrishnan, Peter Stone
CIKM
2009
Springer
15 years 4 months ago
Vetting the links of the web
Many web links mislead human surfers and automated crawlers because they point to changed content, out-of-date information, or invalid URLs. It is a particular problem for large, ...
Na Dai, Brian D. Davison
« Prev « First page 1302 / 1446 Last » Next »