Sciweavers

2450 search results - page 329 / 490
» Exploring Unknown Environments
Sort
View
SIGCOMM
1995
ACM
15 years 7 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
SIGGRAPH
1987
ACM
15 years 7 months ago
Flocks, herds and schools: A distributed behavioral model
The aggregate motion of a flock of birds, a herd of land animals, or a school of fish is a beautiful and familiar part of the natural world. But this type of complex motion is rar...
Craig W. Reynolds
VDA
2010
185views Visualization» more  VDA 2010»
15 years 6 months ago
Visualizing multidimensional data through granularity-dependent spatialization
Spatialization is a special kind of visualization that projects multidimensional data into low-dimensional representational spaces by making use of spatial metaphors. Spatializati...
Sofia Kontaxaki, Eleni Tomai, Margarita Kokla, Mar...
AAAI
2007
15 years 6 months ago
Design of a Mechanism for Promoting Honesty in E-Marketplaces
In this paper, we explore the use of the web as an environment for electronic commerce. In particular, we develop a novel mechanism that creates incentives for honesty in electron...
Jie Zhang, Robin Cohen
AAAI
2007
15 years 6 months ago
RETALIATE: Learning Winning Policies in First-Person Shooter Games
In this paper we present RETALIATE, an online reinforcement learning algorithm for developing winning policies in team firstperson shooter games. RETALIATE has three crucial chara...
Megan Smith, Stephen Lee-Urban, Hector Muño...