Sciweavers

4074 search results - page 228 / 815
» Defining Computational Aesthetics
Sort
View
125
Voted
AICT
2006
IEEE
130views Communications» more  AICT 2006»
15 years 2 months ago
A Search Theoretical Approach to P2P Networks: Analysis of Learning
One of the main characteristics of the peer-to-peer systems is the highly dynamic nature of the users present in the system. In such a rapidly changing enviroment, end-user guaran...
Nazif Cihan Tas, Bedri Kamil Onur Tas
89
Voted
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 2 months ago
A General Notion of Useful Information
In this paper we introduce a general framework for defining the depth of a sequence with respect to a class of observers. We show that our general framework captures all depth not...
Philippe Moser
CP
2008
Springer
15 years 2 months ago
Reformulating Positive Table Constraints Using Functional Dependencies
Constraints that are defined by tables of allowed tuples of assignments are common in constraint programming. In this paper we present an approach to reformulating table constraint...
Hadrien Cambazard, Barry O'Sullivan
CATS
2008
15 years 2 months ago
On the Efficiency of Pollard's Rho Method for Discrete Logarithms
Pollard's rho method is a randomized algorithm for computing discrete logarithms. It works by defining a pseudo-random sequence and then detecting a match in the sequence. Ma...
Shi Bai, Richard P. Brent
AAAI
2004
15 years 2 months ago
Synthetic Adversaries for Urban Combat Training
This paper describes requirements for synthetic adversaries for urban combat training and MOUTBots, a prototype application. The MOUTBots use a commercial computer game to define,...
Robert E. Wray, John E. Laird, Andrew Nuxoll, Devv...