Sciweavers

8655 search results - page 1382 / 1731
» Challenges for Trusted Computing
Sort
View
127
Voted
ATAL
2010
Springer
15 years 4 months ago
Agent interaction, multiple perspectives, and swarming simulation
Agents in a multi-agent system do not act in a vacuum. The outcome of their efforts depends on the environment in which they seek to act, and in particular on the efforts of other...
H. Van Dyke Parunak, Robert Bisson, Sven A. Brueck...
119
Voted
CEC
2010
IEEE
15 years 4 months ago
Learning to overtake in TORCS using simple reinforcement learning
In modern racing games programming non-player characters with believable and sophisticated behaviors is getting increasingly challenging. Recently, several works in the literature ...
Daniele Loiacono, Alessandro Prete, Pier Luca Lanz...
CCCG
2009
15 years 4 months ago
On the Dilation of Delaunay Triangulations of Points in Convex Position
Let S be a finite set of points in the Euclidean plane, and let E be the complete graph whose point-set is S. Chew, in 1986, proved a lower bound of /2 on the stretch factor of th...
Shiliang Cui, Iyad A. Kanj, Ge Xia
CLEF
2010
Springer
15 years 4 months ago
DAEDALUS at WebPS-3 2010: k-Medoids Clustering Using a Cost Function Minimization
This paper describes the participation of DAEDALUS team at the WebPS-3 Task 1, regarding Web People Search. The focus of our research is to evaluate and compare the computational r...
Sara Lana-Serrano, Julio Villena-Román, Jos...
160
Voted
CIIA
2009
15 years 4 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
« Prev « First page 1382 / 1731 Last » Next »