Sciweavers

1993 search results - page 148 / 399
» On Action Theory Change
Sort
View
DEXAW
2005
IEEE
197views Database» more  DEXAW 2005»
15 years 6 months ago
Enhanced Business Intelligence - Supporting Business Processes with Real-Time Business Analytics
In the 21st century, organizations are experiencing environmental changes characterized by indistinct organizational boundaries and fast-paced change. As a result firms need appro...
Andreas Seufert, Josef Schiefer
95
Voted
SACMAT
2003
ACM
15 years 6 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
95
Voted
IPPS
2000
IEEE
15 years 5 months ago
ACDS: Adapting Computational Data Streams for High Performance
Data-intensive, interactive applications are an important class of metacomputing (Grid) applications. They are characterized by large, time-varying data flows between data provid...
Carsten Isert, Karsten Schwan
93
Voted
JIT
1999
Springer
81views Database» more  JIT 1999»
15 years 5 months ago
A Jini-based Gateway Architecture for Mobile Devices
In the near future we expect a widespread deployment of mobile computational resources including network-enabled end devices like Laptops and PDAs. An interesting problem then and ...
Gerd Aschemann, Roger Kehr, Andreas Zeidler
102
Voted
EWCBR
2008
Springer
15 years 2 months ago
Recognizing the Enemy: Combining Reinforcement Learning with Strategy Selection Using Case-Based Reasoning
This paper presents CBRetaliate, an agent that combines Case-Based Reasoning (CBR) and Reinforcement Learning (RL) algorithms. Unlike most previous work where RL is used to improve...
Bryan Auslander, Stephen Lee-Urban, Chad Hogg, H&e...