Sciweavers

9521 search results - page 1815 / 1905
» Compiling with continuations, continued
Sort
View
143
Voted
CORR
2007
Springer
106views Education» more  CORR 2007»
15 years 2 months ago
Bandit Algorithms for Tree Search
Bandit based methods for tree search have recently gained popularity when applied to huge trees, e.g. in the game of go [6]. Their efficient exploration of the tree enables to ret...
Pierre-Arnaud Coquelin, Rémi Munos
108
Voted
CORR
2007
Springer
89views Education» more  CORR 2007»
15 years 2 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
166
Voted
JCST
2008
175views more  JCST 2008»
15 years 2 months ago
Improved Approximate Detection of Duplicates for Data Streams Over Sliding Windows
Detecting duplicates in data streams is an important problem that has a wide range of applications. In general, precisely detecting duplicates in an unbounded data stream is not fe...
Hong Shen, Yu Zhang
123
Voted
IOR
2006
177views more  IOR 2006»
15 years 2 months ago
Combinatorial Benders' Cuts for Mixed-Integer Linear Programming
Mixed-Integer Programs (MIP's) involving logical implications modelled through big-M coefficients, are notoriously among the hardest to solve. In this paper we propose and an...
Gianni Codato, Matteo Fischetti
JETAI
2008
114views more  JETAI 2008»
15 years 2 months ago
On the nature of minds, or: truth and consequences
Are minds really dynamical or are they really symbolic? Because minds are bundles of computations, and because computation is always a matter of interpretation of one system by an...
Shimon Edelman
« Prev « First page 1815 / 1905 Last » Next »