Sciweavers

3134 search results - page 543 / 627
» simulation 2010
Sort
View
153
Voted
JMLR
2010
148views more  JMLR 2010»
14 years 7 months ago
A Generalized Path Integral Control Approach to Reinforcement Learning
With the goal to generate more scalable algorithms with higher efficiency and fewer open parameters, reinforcement learning (RL) has recently moved towards combining classical tec...
Evangelos Theodorou, Jonas Buchli, Stefan Schaal
96
Voted
JMLR
2010
134views more  JMLR 2010»
14 years 7 months ago
Bayesian Algorithms for Causal Data Mining
We present two Bayesian algorithms CD-B and CD-H for discovering unconfounded cause and effect relationships from observational data without assuming causal sufficiency which prec...
Subramani Mani, Constantin F. Aliferis, Alexander ...
136
Voted
JSAC
2010
188views more  JSAC 2010»
14 years 7 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
MACOM
2010
14 years 7 months ago
On the Performance of Single LDGM Codes for Iterative Data Fusion over the Multiple Access Channel
One of the applications of wireless sensor networks currently undergoing active research focuses on the scenario where the information generated by a data source S is simultaneousl...
Javier Del Ser, Javier Garcia-Frias, Pedro M. Cres...
181
Voted
MASS
2010
353views Communications» more  MASS 2010»
14 years 7 months ago
Trailing mobile sinks: A proactive data reporting protocol for Wireless Sensor Networks
In Wireless Sensor Networks (WSN), data gathering using mobile sinks typically incurs constant propagation of sink location indication messages to guide the direction of data repor...
Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li, Ning W...