Sciweavers

6770 search results - page 225 / 1354
» How GPUs Work
Sort
View
138
Voted
JIIS
1998
161views more  JIIS 1998»
15 years 3 months ago
Mining Text Using Keyword Distributions
Knowledge Discovery in Databases (KDD) focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns within them. While most work on...
Ronen Feldman, Ido Dagan, Haym Hirsh
129
Voted
ML
1998
ACM
136views Machine Learning» more  ML 1998»
15 years 3 months ago
Co-Evolution in the Successful Learning of Backgammon Strategy
Following Tesauro’s work on TD-Gammon, we used a 4000 parameter feed-forward neural network to develop a competitive backgammon evaluation function. Play proceeds by a roll of t...
Jordan B. Pollack, Alan D. Blair
PSYCHNOLOGY
2007
96views more  PSYCHNOLOGY 2007»
15 years 3 months ago
A First-time Wireless Internet Connection: More Than Just Clicking on a Link
In the context of understanding the particular use made of nomad Internet and mobile computing in its interactional dimension, this article examines the detail of a first-time con...
Dimitri Voilmy, Karine Lan Hing Ting
137
Voted
EKAW
2010
Springer
15 years 2 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
86
Voted
IPL
2010
93views more  IPL 2010»
15 years 1 months ago
Compiling and securing cryptographic protocols
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequence...
Yannick Chevalier, Michaël Rusinowitch