Sciweavers

1522 search results - page 70 / 305
» Practical Exception Specifications
Sort
View
SIGCSE
1993
ACM
102views Education» more  SIGCSE 1993»
15 years 5 months ago
The internet programming contest: a report and philosophy
Programming contests can provide a high-profile method for attracting interest in computer science. We describe our philosophy as it pertains to the purpose and merits of program...
Vivek Khera, Owen L. Astrachan, David Kotz
ICML
1994
IEEE
15 years 5 months ago
Learning Without State-Estimation in Partially Observable Markovian Decision Processes
Reinforcement learning (RL) algorithms provide a sound theoretical basis for building learning control architectures for embedded agents. Unfortunately all of the theory and much ...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
INCDM
2010
Springer
204views Data Mining» more  INCDM 2010»
15 years 5 months ago
Combining Business Process and Data Discovery Techniques for Analyzing and Improving Integrated Care Pathways
Hospitals increasingly use process models for structuring their care processes. Activities performed to patients are logged to a database but these data are rarely used for managin...
Jonas Poelmans, Guido Dedene, Gerda Verheyden, Her...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 3 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
CATS
2007
15 years 3 months ago
On The Complexity of Manipulating Elections
We study the manipulation of voting schemes, where a voter lies about their preferences in the hope of improving the election’s outcome. All voting schemes are potentially manip...
Tom Coleman, Vanessa Teague