Sciweavers

2180 search results - page 380 / 436
» Comparing bio-inspired algorithms in constrained optimizatio...
Sort
View
ATAL
2007
Springer
15 years 3 months ago
Subjective approximate solutions for decentralized POMDPs
A problem of planning for cooperative teams under uncertainty is a crucial one in multiagent systems. Decentralized partially observable Markov decision processes (DECPOMDPs) prov...
Anton Chechetka, Katia P. Sycara
77
Voted
WABI
2007
Springer
109views Bioinformatics» more  WABI 2007»
15 years 3 months ago
Two Birds, One Stone: Selecting Functionally Informative Tag SNPs for Disease Association Studies
Selecting an informative subset of SNPs, generally referred to as tag SNPs, to genotype and analyze is considered to be an essential step toward effective disease association studi...
Phil Hyoun Lee, Hagit Shatkay
88
Voted
ASPDAC
2006
ACM
110views Hardware» more  ASPDAC 2006»
15 years 3 months ago
Switching-activity driven gate sizing and Vth assignment for low power design
Power consumption has gained much saliency in circuit design recently. One design problem is modelled as ”Under a timing constraint, to minimize power as much as possible”. Pr...
Yu-Hui Huang, Po-Yuan Chen, TingTing Hwang
IJCNLP
2005
Springer
15 years 3 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
AAAI
2008
15 years 22 hour ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen