Sciweavers

11328 search results - page 1875 / 2266
» Timed Branching Processes
Sort
View
PST
2004
15 years 6 months ago
Determining Internet Users' Values for Private Information
We examine the problem of determining a user's value for his/her private information. Web businesses often offer rewards, such as discounts, free downloads and website persona...
Scott Buffett, Nathan Scott, Bruce Spencer, Michae...
156
Voted
PST
2004
15 years 6 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
ICWN
2003
15 years 6 months ago
Energy-Efficient Bootstrapping Protocol for Sensor Networks
Sensor networks are poised for increasingly wider uses in many military and civil applications. We present a bootstrapping protocol for a class of sensor networks in which the net...
Rajesh Mathew, Mohamed F. Younis
IJCAI
2003
15 years 6 months ago
Approximating Optimal Policies for Agents with Limited Execution Resources
An agent with limited consumable execution resources needs policies that attempt to achieve good performance while respecting these limitations. Otherwise, an agent (such as a pla...
Dmitri A. Dolgov, Edmund H. Durfee
IJCAI
2003
15 years 6 months ago
Generalizing Plans to New Environments in Relational MDPs
A longstanding goal in planning research is the ability to generalize plans developed for some set of environments to a new but similar environment, with minimal or no replanning....
Carlos Guestrin, Daphne Koller, Chris Gearhart, Ne...
« Prev « First page 1875 / 2266 Last » Next »