Sciweavers

4345 search results - page 733 / 869
» Relational Reinforcement Learning
Sort
View
ISPASS
2009
IEEE
15 years 10 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...
ESSOS
2009
Springer
15 years 10 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CSE
2009
IEEE
15 years 10 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
IEEEIAS
2009
IEEE
15 years 10 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline
CAIP
2009
Springer
211views Image Analysis» more  CAIP 2009»
15 years 9 months ago
Contextual-Guided Bag-of-Visual-Words Model for Multi-class Object Categorization
Abstract. Bag-of-words model (BOW) is inspired by the text classification problem, where a document is represented by an unsorted set of contained words. Analogously, in the objec...
Mehdi Mirza-Mohammadi, Sergio Escalera, Petia Rade...