Sciweavers

3155 search results - page 519 / 631
» How Are You Doing
Sort
View
CSREASAM
2006
15 years 6 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
HIS
2004
15 years 6 months ago
Stigmergy in Multi Agent Reinforcement Learning
In this paper, we describe how certain aspects of the biological phenomena of stigmergy can be imported into multiagent reinforcement learning (MARL), with the purpose of better e...
Raghav Aras, Alain Dutech, François Charpil...
ICISC
2004
108views Cryptology» more  ICISC 2004»
15 years 6 months ago
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations
We consider the generation of prime order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the ...
Elisavet Konstantinou, Aristides Kontogeorgis, Yan...
NIPS
2004
15 years 6 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 6 months ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu