Sciweavers

12836 search results - page 2277 / 2568
» Generalization Methods in Bioinformatics
Sort
View
ATAL
2010
Springer
15 years 5 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
188
Voted
ATAL
2010
Springer
15 years 5 months ago
Combining manual feedback with subsequent MDP reward signals for reinforcement learning
As learning agents move from research labs to the real world, it is increasingly important that human users, including those without programming skills, be able to teach agents de...
W. Bradley Knox, Peter Stone
167
Voted
CLEF
2010
Springer
15 years 5 months ago
Combination of Classifiers for Indoor Room Recognition CGS participation at ImageCLEF2010 Robot Vision Task
This paper represents a description of our approach to the problem of topological localization of a mobile robot using visual information. Our method has been developed for ImageCL...
Walter Lucetti, Emanuel Luchetti
146
Voted
CIDR
2009
167views Algorithms» more  CIDR 2009»
15 years 5 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
15 years 5 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
« Prev « First page 2277 / 2568 Last » Next »