Sciweavers

494 search results - page 74 / 99
» Probabilistic Programming in Anglican
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
14 years 10 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
JASIS
2006
108views more  JASIS 2006»
14 years 10 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
MP
2006
78views more  MP 2006»
14 years 10 months ago
Valid inequalities based on the interpolation procedure
We study the interpolation procedure of Gomory and Johnson (1972), which generates cutting planes for general integer programs from facets of cyclic group polyhedra. This idea has...
Sanjeeb Dash, Oktay Günlük
AROBOTS
1999
104views more  AROBOTS 1999»
14 years 9 months ago
Reinforcement Learning Soccer Teams with Incomplete World Models
We use reinforcement learning (RL) to compute strategies for multiagent soccer teams. RL may pro t signi cantly from world models (WMs) estimating state transition probabilities an...
Marco Wiering, Rafal Salustowicz, Jürgen Schm...
IEEECIT
2010
IEEE
14 years 8 months ago
Scaling the iHMM: Parallelization versus Hadoop
—This paper compares parallel and distributed implementations of an iterative, Gibbs sampling, machine learning algorithm. Distributed implementations run under Hadoop on facilit...
Sebastien Bratieres, Jurgen Van Gael, Andreas Vlac...