Sciweavers

157 search results - page 31 / 32
» Identifying reasoning patterns in games
Sort
View
AAMAS
2004
Springer
13 years 5 months ago
Automated Assistants for Analyzing Team Behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. The complex interactions of ag...
Ranjit Nair, Milind Tambe, Stacy Marsella, Taylor ...
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 5 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
MSR
2006
ACM
13 years 11 months ago
Tracking defect warnings across versions
Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabil...
Jaime Spacco, David Hovemeyer, William Pugh
KRDB
1998
93views Database» more  KRDB 1998»
13 years 7 months ago
Intelligent Caching for Information Mediators: A KR Based Approach
We present a semantic caching approach for optimizing the performance of information mediators. A critical problem with information mediators, particularly those gathering and int...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi
BMCBI
2005
105views more  BMCBI 2005»
13 years 5 months ago
Secondary structure assignment that accurately reflects physical and evolutionary characteristics
Background: Secondary structure is used in hierarchical classification of protein structures, identification of protein features, such as helix caps and loops, for fold recognitio...
Maria Vittoria Cubellis, Fabien Cailliez, Simon C....