Sciweavers

20197 search results - page 3560 / 4040
» Comparing Computational Power
Sort
View
124
Voted
AAAI
2008
15 years 7 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
127
Voted
AIIDE
2008
15 years 7 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
AIPS
2007
15 years 7 months ago
Prioritizing Bellman Backups without a Priority Queue
Several researchers have shown that the efficiency of value iteration, a dynamic programming algorithm for Markov decision processes, can be improved by prioritizing the order of...
Peng Dai, Eric A. Hansen
AVI
2008
15 years 7 months ago
Evaluation of pointing performance on screen edges
Pointing on screen edges is a frequent task in our everyday use of computers. Screen edges can help stop cursor movements, requiring less precise movements from the user. Thus, po...
Caroline Appert, Olivier Chapuis, Michel Beaudouin...
LISA
2007
15 years 7 months ago
Decision Support for Virtual Machine Re-Provisioning in Production Environments
Management of virtual machines (VMs) on a large scale remains a significant challenge today. We lack general and vendor-independent quantitative criteria/metrics by which to desc...
Kyrre M. Begnum, Matthew Disney, Æleen Frisc...
« Prev « First page 3560 / 4040 Last » Next »