Sciweavers

17951 search results - page 3488 / 3591
» Network Coding Applications
Sort
View
LISA
2007
15 years 9 days ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
USENIX
2008
15 years 9 days ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
CSCW
2008
ACM
14 years 11 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
ESANN
2007
14 years 11 months ago
How to process uncertainty in machine learning?
Uncertainty is a popular phenomenon in machine learning and a variety of methods to model uncertainty at different levels has been developed. The aim of this paper is to motivate ...
Barbara Hammer, Thomas Villmann
ESANN
2008
14 years 11 months ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
« Prev « First page 3488 / 3591 Last » Next »