Sciweavers

6300 search results - page 337 / 1260
» We have it easy, but do we have it right
Sort
View
CEC
2008
IEEE
15 years 8 months ago
Creating edge detectors by evolutionary reinforcement learning
— In this article we present results from experiments where a edge detector was learned from scratch by EANT2, a method for evolutionary reinforcement learning. The detector is c...
Nils T. Siebel, Sven Grünewald, Gerald Sommer
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 8 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
120
Voted
ICDCSW
2007
IEEE
15 years 8 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ATAL
2007
Springer
15 years 8 months ago
Distributed Norm Enforcement Via Ostracism
Abstract. An agent normative society has to deal with two main concerns: how to define norms and how to enforce them. Enforcement becomes a complex issue as agent societies become...
Adrian Perreau de Pinninck, Carles Sierra, W. Marc...
ERCIMDL
2007
Springer
81views Education» more  ERCIMDL 2007»
15 years 8 months ago
Investigating Document Triage on Paper and Electronic Media
Abstract. Document triage is the critical point in the information seeking process when the user first decides the relevance of a document to their information need. This complex ...
George Buchanan, Fernando Loizides