Sciweavers

2237 search results - page 357 / 448
» On the Security of Random Sources
Sort
View
DGO
2003
111views Education» more  DGO 2003»
14 years 11 months ago
Digital Citizenship: Parameters of the Digital Divide
As part of a National Science Foundation-funded study, we analyze data from a 2002 Midwest urban random sample survey (n = 167 adults) of differential access to and uses of comput...
Stuart W. Shulman, Mack C. Shelley, Lisa Thrane
NIPS
2001
14 years 11 months ago
Model-Free Least-Squares Policy Iteration
We propose a new approach to reinforcement learning which combines least squares function approximation with policy iteration. Our method is model-free and completely off policy. ...
Michail G. Lagoudakis, Ronald Parr
SCANGIS
2003
14 years 11 months ago
The Issue of Uncertainty Propagation in Spatial Decision Making
GISs give users facilities to integrate and analyze data from different sources with different scale, accuracy, resolution and quality of the original data which are the key aspect...
Rahim Ali. Abbaspour, Mahmoud Reza Delavar, Reihan...
ICGA
1993
296views Optimization» more  ICGA 1993»
14 years 11 months ago
A Genetic Algorithm Applied to the Maximum Flow Problem
A genetic algorithms is applied to find a maximum flow from the source to sink in a weighted directed graph, where the weight associated with each edge represents its flow capacit...
Toshinori Munakata, David J. Hashier
CLEF
2010
Springer
14 years 11 months ago
Using Web Graph Structure for Person Name Disambiguation
In the third edition of WePS campaign we have undertaken the person name disambiguation problem referred to as a clustering task. Our aim was to make use of intrinsic link relation...
Elena Smirnova, Konstantin Avrachenkov, Brigitte T...