Sciweavers

4305 search results - page 824 / 861
» The Test of Time
Sort
View
ATAL
2008
Springer
15 years 1 months ago
Analysis of an evolutionary reinforcement learning method in a multiagent domain
Many multiagent problems comprise subtasks which can be considered as reinforcement learning (RL) problems. In addition to classical temporal difference methods, evolutionary algo...
Jan Hendrik Metzen, Mark Edgington, Yohannes Kassa...
ATAL
2008
Springer
15 years 1 months ago
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the follower or adversary) before the adv...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
MSR
2010
ACM
15 years 1 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie
AAIM
2005
Springer
119views Algorithms» more  AAIM 2005»
15 years 1 months ago
Locating Performance Monitoring Mobile Agents in Scalable Active Networks
The idea of active networks has been emerged in recent years to increase the processing power inside the network. The intermediate nodes such as routers will be able to host mobile...
Amir Hossein Hadad, Mehdi Dehghan, Hossein Pedram
ACMSE
2006
ACM
15 years 1 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad