Sciweavers

6833 search results - page 1331 / 1367
» Some two-character sets
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
14 years 9 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
JAIR
2008
157views more  JAIR 2008»
14 years 9 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
JAIR
2008
119views more  JAIR 2008»
14 years 9 months ago
A Multiagent Reinforcement Learning Algorithm with Non-linear Dynamics
Several multiagent reinforcement learning (MARL) algorithms have been proposed to optimize agents' decisions. Due to the complexity of the problem, the majority of the previo...
Sherief Abdallah, Victor R. Lesser
COR
2007
163views more  COR 2007»
14 years 9 months ago
A general heuristic for vehicle routing problems
We present a unified heuristic, which is able to solve five different variants of the vehicle routing problem: the vehicle routing problem with time windows (VRPTW), the capacit...
David Pisinger, Stefan Ropke
JCB
2008
52views more  JCB 2008»
14 years 9 months ago
Spectrum-Based De Novo Repeat Detection in Genomic Sequences
A novel approach to the detection of genomic repeats is presented in this paper. The technique, dubbed SAGRI (Spectrum Assisted Genomic Repeat Identifier), is based on the spectru...
Huy Hoang Do, Kwok Pui Choi, Franco P. Preparata, ...
« Prev « First page 1331 / 1367 Last » Next »