Dynamic programming

Results: 2450



#Item
981Dynamic Potential-Based Reward Shaping Sam Devlin Daniel Kudenko  Department of Computer Science,

Dynamic Potential-Based Reward Shaping Sam Devlin Daniel Kudenko Department of Computer Science,

Add to Reading List

Source URL: www.cs.york.ac.uk

Language: English - Date: 2012-05-08 10:32:01
982Microsoft Word - 11.Agile Methods

Microsoft Word - 11.Agile Methods

Add to Reading List

Source URL: agile.csc.ncsu.edu

Language: English - Date: 2011-03-29 12:47:58
983Microsoft Word - DLS11-welcome.doc

Microsoft Word - DLS11-welcome.doc

Add to Reading List

Source URL: www.hpi.uni-potsdam.de

Language: English - Date: 2015-05-08 07:57:15
984CS 373  Homework 1 (dueSpring 1999

CS 373 Homework 1 (dueSpring 1999

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 08:54:08
985Software Process Barcelona, March 20th, 2001 Content  §

Software Process Barcelona, March 20th, 2001 Content §

Add to Reading List

Source URL: fraber.de

Language: English - Date: 2001-09-24 18:21:33
986Higher-Order Dynamic Pattern Unification for Dependent Types and Records Andreas Abel1 and Brigitte Pientka2 1  Institut f¨

Higher-Order Dynamic Pattern Unification for Dependent Types and Records Andreas Abel1 and Brigitte Pientka2 1 Institut f¨

Add to Reading List

Source URL: www2.tcs.ifi.lmu.de

Language: English - Date: 2011-02-03 11:01:19
987Extending a Java Virtual Machine to Dynamic Object-oriented Languages

Extending a Java Virtual Machine to Dynamic Object-oriented Languages

Add to Reading List

Source URL: www.hpi.uni-potsdam.de

Language: English - Date: 2015-05-08 07:57:42
98816th Canadian Conference on Computational Geometry, 2004  ´ any’s ´ A Stronger Version of Bar Theorem in the Plane

16th Canadian Conference on Computational Geometry, 2004 ´ any’s ´ A Stronger Version of Bar Theorem in the Plane

Add to Reading List

Source URL: www.cccg.ca

Language: English - Date: 2004-08-23 15:27:23
989QuietRIATT: Rebuilding the Import Address Table Using Hooked DLL Calls Jason Raber () Brian Krumheuer () Riverside Research Institute January 2009

QuietRIATT: Rebuilding the Import Address Table Using Hooked DLL Calls Jason Raber () Brian Krumheuer () Riverside Research Institute January 2009

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
990Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Automated Security Debugging Using Program Structural Constraints∗ Chongkyung Kil∗, Emre Can Sezer∗, Peng Ning∗, and Xiaolan Zhang† Department of Computer Science∗ North Carolina State University {ckil, eseze

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58