Sciweavers

1912 search results - page 325 / 383
» On the evaluation of argumentation formalisms
Sort
View
JCP
2008
139views more  JCP 2008»
14 years 11 months ago
Agent Learning in Relational Domains based on Logical MDPs with Negation
In this paper, we propose a model named Logical Markov Decision Processes with Negation for Relational Reinforcement Learning for applying Reinforcement Learning algorithms on the ...
Song Zhiwei, Chen Xiaoping, Cong Shuang
JSA
2008
81views more  JSA 2008»
14 years 11 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
JHSN
2006
95views more  JHSN 2006»
14 years 11 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JSW
2006
71views more  JSW 2006»
14 years 11 months ago
Semantics and Extensions of WS-Agreement
When having repeated interactions with a service provider, a service consumer might desire guarantees on the delivery of the service. These guarantees involve both functional and n...
Ganna Frankova, Daniela Malfatti, Marco Aiello
RTS
2006
176views more  RTS 2006»
14 years 11 months ago
Verifying distributed real-time properties of embedded systems via graph transformations and model checking
Component middleware provides dependable and efficient platforms that support key functional, and quality of service (QoS) needs of distributed real-time embedded (DRE) systems. C...
Gabor Madl, Sherif Abdelwahed, Douglas C. Schmidt