Sciweavers

2601 search results - page 119 / 521
» Secure Rewarding Schemes
Sort
View
ACNS
2005
Springer
81views Cryptology» more  ACNS 2005»
15 years 8 months ago
Searching for High-Value Rare Events with Uncheatable Grid Computing
Abstract. High-value rare-event searching is arguably the most natural application of grid computing, where computational tasks are distributed to a large collection of clients (wh...
Wenliang Du, Michael T. Goodrich
EUROPAR
2003
Springer
15 years 8 months ago
Incentives for Combatting Freeriding on P2P Networks
We address the freerider problem on P2P networks. We first propose a specific participation metric, which we call a peer’s EigenTrust score. We show that EigenTrust scores accu...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
ECML
2007
Springer
15 years 7 months ago
Efficient Continuous-Time Reinforcement Learning with Adaptive State Graphs
Abstract. We present a new reinforcement learning approach for deterministic continuous control problems in environments with unknown, arbitrary reward functions. The difficulty of...
Gerhard Neumann, Michael Pfeiffer, Wolfgang Maass
PRL
2007
200views more  PRL 2007»
15 years 2 months ago
Generative learning of visual concepts using multiobjective genetic programming
This paper introduces a novel method of visual learning based on Genetic Programming, which evolves a population of individuals (image analysis programs) that process attributed v...
Krzysztof Krawiec
CEC
2009
IEEE
15 years 27 days ago
Multi-objective Combinatorial Optimisation with Coincidence algorithm
-- Most optimization algorithms that use probabilistic models focus on extracting the information from good solutions found in the population. A selection method discards the below...
Warin Wattanapornprom, Panuwat Olanviwitchai, Para...