Sciweavers

1068 search results - page 184 / 214
» Group Dominant Strategies
Sort
View
CCIA
2009
Springer
14 years 10 months ago
Interaction, observance or both? Study of the effects on convention emergence
Abstract. Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. The emergence of such conve...
Daniel Villatoro, Jordi Sabater-Mir, Sandip Sen
73
Voted
CLEF
2010
Springer
14 years 10 months ago
It Was Easy, when Apples and Blackberries Were only Fruits
Ambiguities in company names are omnipresent. This is not accidental, companies deliberately chose ambiguous brand names, as part of their marketing and branding strategy. This pro...
Surender Reddy Yerva, Zoltán Miklós,...
EWC
2006
61views more  EWC 2006»
14 years 9 months ago
Embarrassingly parallel mesh refinement by edge subdivision
We have previously proposed a new technique for the communication-free adaptive refinement of tetrahedral meshes that works for all configurations. Implementations of the scheme mu...
David C. Thompson, Philippe P. Pébay
76
Voted
IJRR
2008
114views more  IJRR 2008»
14 years 9 months ago
Active Electrolocation for Underwater Target Localization
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
CN
2007
106views more  CN 2007»
14 years 9 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...