Sciweavers

8808 search results - page 1478 / 1762
» Process Change Patterns
Sort
View
144
Voted
AAMAS
2007
Springer
15 years 8 months ago
Bifurcation Analysis of Reinforcement Learning Agents in the Selten's Horse Game
Abstract. The application of reinforcement learning algorithms to multiagent domains may cause complex non-convergent dynamics. The replicator dynamics, commonly used in evolutiona...
Alessandro Lazaric, Jose Enrique Munoz de Cote, Fa...
114
Voted
ATAL
2007
Springer
15 years 8 months ago
Robust coordination to sustain throughput of an unstable agent network
We present a multi-agent coordination technique to maintain throughput of a large-scale agent network system in the face of failures of agents. Failures do not just deteriorate th...
Rajesh Gautam, Kazuo Miyashita
CCS
2007
ACM
15 years 8 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
CEAS
2007
Springer
15 years 8 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
82
Voted
CIKM
2007
Springer
15 years 8 months ago
Parameter sensitivity in the probabilistic model for ad-hoc retrieval
The term frequency normalisation parameter sensitivity is an important issue in the probabilistic model for Information Retrieval. A high parameter sensitivity indicates that a sl...
Ben He, Iadh Ounis
« Prev « First page 1478 / 1762 Last » Next »