Sciweavers

337 search results - page 51 / 68
» On Weak Markov's Principle
Sort
View
INFOCOM
2010
IEEE
14 years 11 months ago
Password Strength: An Empirical Analysis
—It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and password recovery tools c...
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
MSS
2010
IEEE
133views Hardware» more  MSS 2010»
14 years 10 months ago
A trichotomy of attitudes for decision-making under complete ignorance
This paper investigates ‘complete ignorance’ (CI) in the tradition of the CI literature and provides a characterization of possible attitudes toward ignorance. Pessimism, opti...
Ronan Congar, François Maniquet
SIAMSC
2010
108views more  SIAMSC 2010»
14 years 10 months ago
Goal-Oriented Error Estimation and Adaptivity for Free-Boundary Problems: The Shape-Linearization Approach
Abstract. We develop duality-based a posteriori error estimates for functional outputs of solutions of free-boundary problems via shape-linearization principles. To derive an appro...
K. G. van der Zee, E. H. van Brummelen, R. de Bors...
PKDD
2010
Springer
179views Data Mining» more  PKDD 2010»
14 years 10 months ago
Gaussian Processes for Sample Efficient Reinforcement Learning with RMAX-Like Exploration
Abstract. We present an implementation of model-based online reinforcement learning (RL) for continuous domains with deterministic transitions that is specifically designed to achi...
Tobias Jung, Peter Stone
134
Voted
ICWN
2009
14 years 10 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...