Sciweavers

7839 search results - page 216 / 1568
» What's there and what's not
Sort
View
124
Voted
GECCO
2010
Springer
153views Optimization» more  GECCO 2010»
15 years 4 months ago
Multi-task evolutionary shaping without pre-specified representations
Shaping functions can be used in multi-task reinforcement learning (RL) to incorporate knowledge from previously experienced tasks to speed up learning on a new task. So far, rese...
Matthijs Snel, Shimon Whiteson
122
Voted
ECIR
2007
Springer
15 years 3 months ago
Feature- and Query-Based Table of Contents Generation for XML Documents
The availability of a document’s logical structure in XML retrieval allows retrieval systems to return document portions (elements) instead of whole documents. This helps searche...
Zoltán Szlávik, Anastasios Tombros, ...
ECIS
2001
15 years 3 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
CGF
2005
78views more  CGF 2005»
15 years 1 months ago
Visual Supercomputing: Technologies, Applications and Challenges
If we were to have a Grid infrastructure for visualization, what technologies would be needed to build such an infrastructure, what kind of applications would benefit from it, and...
Ken Brodlie, John Brooke, Min Chen, David Chisnall...
EUROMICRO
2007
IEEE
15 years 5 months ago
Guiding Component-Based Hardware/Software Co-Verification with Patterns
In component-based hardware/software co-verification, properties of an embedded system are established from properties of its hardware and software components. A major challenge i...
Juncao Li, Fei Xie, Huaiyu Liu