Sciweavers

660 search results - page 79 / 132
» The Active Process Interaction with Its Environment
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 9 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 5 months ago
Identifying a Company's Non-Customer Online Communities: a Proto-typology
This paper describes an exploratory, qualitative study of a process for extracting, identifying and exploiting an enterprise's implicit (less visible) web communities using l...
Edna O. F. Reid
IWPC
2002
IEEE
15 years 4 months ago
An Open Visualization Toolkit for Reverse Architecting
Maintenance and evolution of complex software systems (such as large telecom embedded devices) involve activities such as reverse engineering (RE) and software visualization. Alth...
Alexandru Telea, Alessandro Maccari, Claudio Riva
AAAI
2006
15 years 1 months ago
Action Selection in Bayesian Reinforcement Learning
My research attempts to address on-line action selection in reinforcement learning from a Bayesian perspective. The idea is to develop more effective action selection techniques b...
Tao Wang
SSDBM
1998
IEEE
141views Database» more  SSDBM 1998»
15 years 4 months ago
Scientific Workflow Management by Database Management
In several working environments, production involves repeated executions of certain procedures. A workflow describes the individual tasks performed in these procedures and their i...
Anastassia Ailamaki, Yannis E. Ioannidis, Miron Li...