An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Q-learning, a most widely used reinforcement learning method, normally needs well-defined quantized state and action spaces to converge. This makes it difficult to be applied to re...
cross-linguistically valid claims about which discourses are easier to process, abstracting away from specific algorithms for anaphora resolution or anaphora generation (although m...
Massimo Poesio, Rosemary Stevenson, Barbara Di Eug...
jr.sagepub.com/cgi/content/abstract/19/2/183 The online version of this article can be found at: Published by: http://www.sagepublications.com On behalf of: Multimedia Archives can...
An important issue in a component-based software development process is the supply source of mature, reliable, adaptable, and maintainable components. We define as component minin...