Sciweavers

741 search results - page 145 / 149
» Tools and techniques for Network Forensics
Sort
View
CSCW
2008
ACM
14 years 12 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
ESANN
2008
14 years 11 months ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
WSC
2004
14 years 11 months ago
Data Farming Coevolutionary Dynamics in RePast
This paper describes the application of data farming techniques (Brandstein and Horne 1998) to explore various aspects of coevolutionary dynamics (McKelvey 2002) in organization s...
Brian F. Tivnan
AAMAS
2010
Springer
14 years 10 months ago
Evolutionary mechanism design: a review
Abstract The advent of large-scale distributed systems poses unique engineering challenges. In open systems such as the internet it is not possible to prescribe the behaviour of al...
Steve Phelps, Peter McBurney, Simon Parsons
BMCBI
2010
129views more  BMCBI 2010»
14 years 10 months ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...