Paper machine

Results: 1232



#Item
231Practical Issues in Temporal Difference Learning∗ Gerald Tesauro IBM Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NYUSA Abstract. This paper examines whether temporal difference methods for t

Practical Issues in Temporal Difference Learning∗ Gerald Tesauro IBM Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NYUSA Abstract. This paper examines whether temporal difference methods for t

Add to Reading List

Source URL: aass.oru.se

Language: English - Date: 2005-06-14 12:26:47
232COUNTRY PRESENTATION PAPER THAILAND Regional Roundtable of National Agricultural Machinery Associations in Asia and the Pacific  Viboon Thepent

COUNTRY PRESENTATION PAPER THAILAND Regional Roundtable of National Agricultural Machinery Associations in Asia and the Pacific Viboon Thepent

Add to Reading List

Source URL: un-csam.org

Language: English - Date: 2014-11-07 04:05:26
233AUTOMATIC DOCUMENT FOLDING  FD 382 shown with optional Multi-Sheet Feeder The Automatic FD 382 Document Folder offers any business, church, school or print for pay center quick, easy set-up, and the versatility to comple

AUTOMATIC DOCUMENT FOLDING FD 382 shown with optional Multi-Sheet Feeder The Automatic FD 382 Document Folder offers any business, church, school or print for pay center quick, easy set-up, and the versatility to comple

Add to Reading List

Source URL: www.bb-tech.com

Language: English - Date: 2015-03-23 12:50:28
234FD 38X Spec Sheet 6-10 DO NOT open in new InDesign.indd

FD 38X Spec Sheet 6-10 DO NOT open in new InDesign.indd

Add to Reading List

Source URL: www.bb-tech.com

Language: English - Date: 2015-03-23 12:50:31
235Abstract In this paper, we address the latency issue in RTXEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler is difficult to use

Abstract In this paper, we address the latency issue in RTXEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler is difficult to use

Add to Reading List

Source URL: wiki.xenproject.org

Language: English - Date: 2015-04-03 10:15:51
236A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE) A Research Proposal for an NSF CyberTrust Center Submitted February 2005 Aviel D. Rubin (ACCURATE Director), Johns Hopkins Universit

A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections (ACCURATE) A Research Proposal for an NSF CyberTrust Center Submitted February 2005 Aviel D. Rubin (ACCURATE Director), Johns Hopkins Universit

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
237Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure? A Smart Card Alliance Payments Council White Paper  Publication Date: February 2011

Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure? A Smart Card Alliance Payments Council White Paper Publication Date: February 2011

Add to Reading List

Source URL: www.smartcardalliance.org

Language: English - Date: 2011-02-03 13:34:34
238Security and Reliability of Webb County’s ES&S Voting System and the March ’06 Primary Election

Security and Reliability of Webb County’s ES&S Voting System and the March ’06 Primary Election

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
239VIRTUAL HOSTING  SUPPORTED GUEST OS White Paper, releaseGuest OS licenses in the Virtual Hosting Platform

VIRTUAL HOSTING SUPPORTED GUEST OS White Paper, releaseGuest OS licenses in the Virtual Hosting Platform

Add to Reading List

Source URL: www.gtsce.com

Language: English - Date: 2013-04-02 11:54:46
240A preliminary version of this paper appeared in Theory of Cryptography Conference, TCC ’05, Lecture Notes in Computer Science Vol. ???, Joe Kilian ed, Springer Verlag, 2005. This is the full version. Secure Computation

A preliminary version of this paper appeared in Theory of Cryptography Conference, TCC ’05, Lecture Notes in Computer Science Vol. ???, Joe Kilian ed, Springer Verlag, 2005. This is the full version. Secure Computation

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 13:27:27