Sciweavers

1734 search results - page 20 / 347
» its 2000
Sort
View
ISW
2000
Springer
15 years 1 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ROBOCUP
2000
Springer
130views Robotics» more  ROBOCUP 2000»
15 years 1 months ago
Improvement Continuous Valued Q-learning and Its Application to Vision Guided Behavior Acquisition
Q-learning, a most widely used reinforcement learning method, normally needs well-defined quantized state and action spaces to converge. This makes it difficult to be applied to re...
Yasutake Takahashi, Masanori Takeda, Minoru Asada
72
Voted
COLING
2004
14 years 9 months ago
Centering: A Parametric Theory and Its Instantiations
cross-linguistically valid claims about which discourses are easier to process, abstracting away from specific algorithms for anaphora resolution or anaphora generation (although m...
Massimo Poesio, Rosemary Stevenson, Barbara Di Eug...
IJRR
2000
58views more  IJRR 2000»
14 years 9 months ago
Geared Robot Manipulators with a Jointed Unit: Topological Synthesis and Its Application
jr.sagepub.com/cgi/content/abstract/19/2/183 The online version of this article can be found at: Published by: http://www.sagepublications.com On behalf of: Multimedia Archives can...
Dar-Zen Chen, Yu-Chu Huang, Dong-Wen Duh
INFSOF
2000
122views more  INFSOF 2000»
14 years 9 months ago
Component mining: a process and its pattern language
An important issue in a component-based software development process is the supply source of mature, reliable, adaptable, and maintainable components. We define as component minin...
Diomidis Spinellis, K. Raptis