Sciweavers

2065 search results - page 377 / 413
» P systems applications to systems biology
Sort
View
ICDM
2002
IEEE
105views Data Mining» more  ICDM 2002»
15 years 6 months ago
Empirical Comparison of Various Reinforcement Learning Strategies for Sequential Targeted Marketing
We empirically evaluate the performance of various reinforcement learning methods in applications to sequential targeted marketing. In particular, we propose and evaluate a progre...
Naoki Abe, Edwin P. D. Pednault, Haixun Wang, Bian...
MOBILITY
2009
ACM
15 years 6 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ICRA
2000
IEEE
136views Robotics» more  ICRA 2000»
15 years 6 months ago
Registration of Range Data Using a Hybrid Simulated Annealing and Iterative Closest Point Algorithm
The need to register data is abundant in applications such as: world modeling, part inspection and manufacturing, object recognition, pose estimation, robotic navigation, and reve...
Jason P. Luck, Charles Q. Little, William Hoff
VLSID
2000
IEEE
102views VLSI» more  VLSID 2000»
15 years 6 months ago
Inductance Characterization of Small Interconnects Using Test-Signal Method
The test signal method can be used to measure and model inductance parameters (self and mutual) of a very small interconnect especially in highdensity IC’s by using a test signa...
Jeegar Tilak Shah, Madhav P. Desai, Sugata Sanyal
SIGSOFT
2000
ACM
15 years 6 months ago
Designing robust Java programs with exceptions
Exception handling mechanisms are intended to help developers build robust systems. Although an exception handling mechanism provides a basis for structuring source code dealing w...
Martin P. Robillard, Gail C. Murphy