Sciweavers

32032 search results - page 6237 / 6407
» Verified programming in Guru
Sort
View
116
Voted
USS
2004
15 years 1 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...
WIS
2004
15 years 1 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
NIPS
2003
15 years 1 months ago
Max-Margin Markov Networks
In typical classification tasks, we seek a function which assigns a label to a single object. Kernel-based approaches, such as support vector machines (SVMs), which maximize the ...
Benjamin Taskar, Carlos Guestrin, Daphne Koller
AAAI
2000
15 years 1 months ago
Decision Making under Uncertainty: Operations Research Meets AI (Again)
Models for sequential decision making under uncertainty (e.g., Markov decision processes,or MDPs) have beenstudied in operations research for decades. The recent incorporation of ...
Craig Boutilier
103
Voted
AAAI
1998
15 years 1 months ago
Learning Investment Functions for Controlling the Utility of Control Knowledge
The utility problem occurs when the cost of the acquired knowledge outweighs its bene ts. When the learner acquires control knowledge for speeding up a problem solver, the bene t ...
Oleg Ledeniov, Shaul Markovitch
« Prev « First page 6237 / 6407 Last » Next »