Sciweavers

8903 search results - page 1683 / 1781
» Alternative
Sort
View
CORR
2007
Springer
106views Education» more  CORR 2007»
14 years 9 months ago
Bandit Algorithms for Tree Search
Bandit based methods for tree search have recently gained popularity when applied to huge trees, e.g. in the game of go [6]. Their efficient exploration of the tree enables to ret...
Pierre-Arnaud Coquelin, Rémi Munos
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 9 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
CORR
2007
Springer
103views Education» more  CORR 2007»
14 years 9 months ago
Physical limits of inference
We show that physical devices that perform observation, prediction, or recollection share an underlying mathematical structure. We call devices with that structure “inference de...
David H. Wolpert
CORR
2007
Springer
122views Education» more  CORR 2007»
14 years 9 months ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
JETAI
2008
114views more  JETAI 2008»
14 years 9 months ago
On the nature of minds, or: truth and consequences
Are minds really dynamical or are they really symbolic? Because minds are bundles of computations, and because computation is always a matter of interpretation of one system by an...
Shimon Edelman
« Prev « First page 1683 / 1781 Last » Next »