Sciweavers

466 search results - page 68 / 94
» A Theory of Rate-Based Execution
Sort
View
IJCAI
2001
14 years 11 months ago
Integrating Expectations from Different Sources to Help End Users Acquire Procedural Knowledge
Role-limiting approaches using explicit theories of problem-solving have been successful for acquiring knowledge from domain experts1 . However most systems using this approach do...
Jim Blythe
AIIDE
2009
14 years 11 months ago
Improving Offensive Performance Through Opponent Modeling
Although in theory opponent modeling can be useful in any adversarial domain, in practice it is both difficult to do accurately and to use effectively to improve game play. In thi...
Kennard Laviers, Gita Sukthankar, David W. Aha, Ma...
IJRR
2008
73views more  IJRR 2008»
14 years 9 months ago
Optimization of Complex Robot Applications under Real Physical Limitations
This paper deals with minimum time trajectory optimization along a specified path subject to thermal constraints. We point out here that robots are often integrated in complex rob...
Matthieu Guilbert, Luc D. Joly, Pierre-Brice Wiebe...
CORR
2007
Springer
122views Education» more  CORR 2007»
14 years 9 months ago
Modeling Epidemic Spread in Synthetic Populations - Virtual Plagues in Massively Multiplayer Online Games
A virtual plague is a process in which a behavior-affecting property spreads among characters in a Massively Multiplayer Online Game (MMOG). The MMOG individuals constitute a synt...
Magnus Boman, Stefan J. Johansson
JSAC
2006
128views more  JSAC 2006»
14 years 9 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum