Sciweavers

4345 search results - page 733 / 869
» Relational Reinforcement Learning
Sort
View
ISPASS
2009
IEEE
15 years 4 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
ESSOS
2009
Springer
15 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CSE
2009
IEEE
15 years 4 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
IEEEIAS
2009
IEEE
15 years 4 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
CAIP
2009
Springer
211views Image Analysis» more  CAIP 2009»
15 years 4 months ago
Contextual-Guided Bag-of-Visual-Words Model for Multi-class Object Categorization
Abstract. Bag-of-words model (BOW) is inspired by the text classification problem, where a document is represented by an unsorted set of contained words. Analogously, in the objec...
Mehdi Mirza-Mohammadi, Sergio Escalera, Petia Rade...