Sciweavers

1063 search results - page 124 / 213
» Order and Negation as Failure
Sort
View
82
Voted
ICML
2002
IEEE
16 years 1 months ago
Reinforcement Learning and Shaping: Encouraging Intended Behaviors
We explore dynamic shaping to integrate our prior beliefs of the final policy into a conventional reinforcement learning system. Shaping provides a positive or negative artificial...
Adam Laud, Gerald DeJong
97
Voted
KDD
2009
ACM
208views Data Mining» more  KDD 2009»
16 years 1 months ago
A principled and flexible framework for finding alternative clusterings
The aim of data mining is to find novel and actionable insights in data. However, most algorithms typically just find a single (possibly non-novel/actionable) interpretation of th...
Zijie Qi, Ian Davidson
85
Voted
STOC
2002
ACM
80views Algorithms» more  STOC 2002»
16 years 1 months ago
Strict polynomial-time in simulation and extraction
The notion of efficient computation is usually identified in cryptography and complexity with (strict) probabilistic polynomial time. However, until recently, in order to obtain c...
Boaz Barak, Yehuda Lindell
CSCW
2010
ACM
15 years 9 months ago
Sonic souvenirs: exploring the paradoxes of recorded sound for family remembering
We explore the role of sound as a medium for social reminiscing: 10 families were involved in recording ‘sonic souvenirs’ of their holidays. They shared and discussed their co...
Lina Dib, Daniela Petrelli, Steve Whittaker
87
Voted
CSE
2009
IEEE
15 years 7 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...