Sciweavers

1592 search results - page 268 / 319
» The state of the email address
Sort
View
JCM
2007
101views more  JCM 2007»
15 years 1 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
TSMC
2008
104views more  TSMC 2008»
15 years 1 months ago
Using Shared-Resource Capacity for Robust Control of Failure-Prone Manufacturing Systems
Deadlock-free resource allocation has been an active area of research in flexible manufacturing. Most researchers have assumed that allocated resources do not fail, and thus, littl...
Shengyong Wang, Song Foh Chew, Mark A. Lawley
MAM
2007
90views more  MAM 2007»
15 years 1 months ago
Clustered indexing for branch predictors
ct 8 As a result of resource limitations, state in branch predictors is frequently shared between uncorrelated branches. This interference 9 can significantly limit prediction acc...
Veerle Desmet, Hans Vandierendonck, Koen De Bossch...
CCR
1999
92views more  CCR 1999»
15 years 1 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
ML
1998
ACM
101views Machine Learning» more  ML 1998»
15 years 29 days ago
Elevator Group Control Using Multiple Reinforcement Learning Agents
Recent algorithmic and theoretical advances in reinforcement learning (RL) have attracted widespread interest. RL algorithmshave appeared that approximatedynamic programming on an ...
Robert H. Crites, Andrew G. Barto