Sciweavers

679 search results - page 136 / 136
» Using decision problems in public key cryptography
Sort
View
PVLDB
2010
117views more  PVLDB 2010»
14 years 8 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...
JBI
2011
233views Bioinformatics» more  JBI 2011»
14 years 4 months ago
A set of ontologies to drive tools for the control of vector-borne diseases
We are developing a set of ontologies that deal with vector-borne diseases and the arthropod vectors that transmit them. For practical reasons (application priorities), we initiat...
Pantelis Topalis, Emmanuel Dialynas, Elvira Mitrak...
TCOM
2011
130views more  TCOM 2011»
14 years 4 months ago
Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive Networks
—In cognitive networks, since nodes generally belong to different authorities and pursue different goals, they will not cooperate with others unless cooperation can improve their...
Yan Chen, K. J. Ray Liu
96
Voted
ICML
1996
IEEE
15 years 10 months ago
Learning Evaluation Functions for Large Acyclic Domains
Some of the most successful recent applications of reinforcement learning have used neural networks and the TD algorithm to learn evaluation functions. In this paper, we examine t...
Justin A. Boyan, Andrew W. Moore