Sciweavers

20833 search results - page 3941 / 4167
» Hidden process models
Sort
View
JMLR
2006
124views more  JMLR 2006»
15 years 4 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
JNW
2006
68views more  JNW 2006»
15 years 4 months ago
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topolo...
Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee...
NLE
2008
108views more  NLE 2008»
15 years 4 months ago
Using automatically labelled examples to classify rhetorical relations: an assessment
Being able to identify which rhetorical relations (e.g., contrast or explanation) hold between spans of text is important for many natural language processing applications. Using ...
Caroline Sporleder, Alex Lascarides
NN
2008
Springer
150views Neural Networks» more  NN 2008»
15 years 4 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...
FGCS
2007
160views more  FGCS 2007»
15 years 4 months ago
Distributed data mining in grid computing environments
The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with an e...
Ping Luo, Kevin Lü, Zhongzhi Shi, Qing He
« Prev « First page 3941 / 4167 Last » Next »