Sciweavers

14774 search results - page 2899 / 2955
» Computational complexity and evolutionary computation
Sort
View
ATAL
2010
Springer
15 years 5 months ago
Closing the learning-planning loop with predictive state representations
A central problem in artificial intelligence is to choose actions to maximize reward in a partially observable, uncertain environment. To do so, we must learn an accurate model of ...
Byron Boots, Sajid M. Siddiqi, Geoffrey J. Gordon
ATAL
2010
Springer
15 years 5 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
136
Voted
CLEF
2010
Springer
15 years 5 months ago
Fuzzy Semantic-Based String Similarity for Extrinsic Plagiarism Detection - Lab Report for PAN at CLEF 2010
This report explains our plagiarism detection method using fuzzy semantic-based string similarity approach. The algorithm was developed through four main stages. First is pre-proce...
Salha Alzahrani, Naomie Salim
MM
2010
ACM
185views Multimedia» more  MM 2010»
15 years 4 months ago
The virtual chocolate factory: mixed reality industrial collaboration and control
We show several aspects of a complex mixed reality system that we have built and deployed in a real-world factory setting. In our system, virtual worlds, augmented realities, and ...
Maribeth Back, Don Kimber, Eleanor G. Rieffel, Ant...
MOBICOM
2010
ACM
15 years 4 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
« Prev « First page 2899 / 2955 Last » Next »