Zobrazeno 1 - 10
of 2 625
pro vyhledávání: '"Cloning (programming)"'
Publikováno v:
IEEE Transactions on Pattern Analysis and Machine Intelligence. 44:6968-6980
In sequential decision-making, imitation learning (IL) trains a policy efficiently by mimicking expert demonstrations. Various imitation methods were proposed and empirically evaluated, meanwhile, their theoretical understandings need further studies
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 10:1621-1632
The introduction of Physical Unclonable Functions (PUFs) has been originally motivated by their ability to resist physical attacks, particularly in anti-counterfeiting scenarios. In these one-way functions, machine learning, cryptanalysis, and side-c
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 23:5128-5137
It is indispensable for professional traffic signal engineers to perform manual operations of traffic signal control (TSC) to mitigate traffic congestion, especially with complicated scenarios. However, such a task is time-consuming, and the level of
Autor:
B Ravi Kiran, Victor Talpaert, Ibrahim Sobh, Ahmad A. Al Sallab, Patrick Pérez, Patrick Mannion, Senthil Yogamani
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 23:4909-4926
With the development of deep representation learning, the domain of reinforcement learning (RL) has become a powerful learning framework now capable of learning complex policies in high dimensional environments. This review summarises deep reinforcem
Autor:
Junchen Jin, Yanhao Huang, Fei-Yue Wang, Xiaoshuang Li, Xiao Wang, Xinhu Zheng, Jun Jason Zhang
Publikováno v:
Neurocomputing. 467:300-309
Deep Reinforcement Learning (DRL) has proven its capability to learn optimal policies in decision-making problems by directly interacting with environments. Meanwhile, supervised learning methods also show great capability of learning from data. Howe
Autor:
Christos Skrekas, Johan Gustafsson, Florian David, Maximilian Otto, Verena Siewers, Michael Gossing
Publikováno v:
ACS Synthetic Biology
Standardisation of genetic parts has become a topic of increasing interest over the last decades. The promise of simplifying molecular cloning procedures, while at the same time making them more predictable and reproducible has led to the design of s
Autor:
Biplab Sikdar, Gaurang Bansal
Publikováno v:
IEEE Networking Letters. 3:177-180
This letter proposes a scalable authentication protocol to address the security vulnerabilities in UAV-base station communication. UAVs are particularly vulnerable to multiple cyberattacks such as physical capture, cloning attacks, eavesdropping, and
Autor:
James Newman
Publikováno v:
Perspectives on the European Videogame
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 9, Pp 1055-1063 (2021)
Copy-move image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. In this type of image forging, a region of the image is copied and pasted elsewhere in
Autor:
Wayan Suparta, Dodick Zulaimi Sudirman
Publikováno v:
Journal of Games, Game Art, and Gamification. 5:27-32
If a developer uses trademarked content from other game such as images and music, it will be illegal. But it is fine for the developer to copy the gameplay and make innovative changes to improve the game. This is a good practice that boosts innovatio