Sciweavers

6770 search results - page 282 / 1354
» How GPUs Work
Sort
View
SIGKDD
2008
138views more  SIGKDD 2008»
15 years 3 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...
127
Voted
IJNSEC
2007
96views more  IJNSEC 2007»
15 years 3 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
116
Voted
JAIR
2007
127views more  JAIR 2007»
15 years 3 months ago
Learning Symbolic Models of Stochastic Domains
In this article, we work towards the goal of developing agents that can learn to act in complex worlds. We develop a a new probabilistic planning rule representation to compactly ...
Hanna M. Pasula, Luke S. Zettlemoyer, Leslie Pack ...
151
Voted
AAMAS
2002
Springer
15 years 3 months ago
Relational Reinforcement Learning for Agents in Worlds with Objects
In reinforcement learning, an agent tries to learn a policy, i.e., how to select an action in a given state of the environment, so that it maximizes the total amount of reward it ...
Saso Dzeroski
COLING
2002
15 years 3 months ago
Reasoning in Metaphor Understanding: The ATT-Meta Approach and System
A detailed approach has been developed for core aspects of the task of understanding a broad class of metaphorical utterances. The utterances in question are those that depend on ...
John A. Barnden, Sheila Glasbey, Mark G. Lee, Alan...