Sciweavers

948 search results - page 175 / 190
» Modelling Agents as Observable Sources
Sort
View
117
Voted
ICPR
2006
IEEE
16 years 1 months ago
Bayesian Imitation of Human Behavior in Interactive Computer Games
Modern interactive computer games provide the ability to objectively record complex human behavior, offering a variety of interesting challenges to the pattern-recognition communi...
Bernard Gorman, Christian Bauckhage, Christian Thu...
113
Voted
ATAL
2010
Springer
15 years 1 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
100
Voted
AROBOTS
2002
131views more  AROBOTS 2002»
15 years 8 days ago
Automated Derivation of Primitives for Movement Classification
Abstract. We describe a new method for representing human movement compactly, in terms of a linear superimposition of simpler movements termed primitives. This method is a part of ...
Ajo Fod, Maja J. Mataric, Odest Chadwicke Jenkins
119
Voted
BROADNETS
2006
IEEE
15 years 4 months ago
Wavelength Assignment in Optical Networks with Imprecise Network State Information
Efficient routing and wavelength assignment (RWA) in wavelength-routed all-optical networks is critical for achieving high efficiency over the backbone links. Extensive research ha...
Satyajeet Ahuja, Marwan Krunz, Srinivasan Ramasubr...
110
Voted
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 1 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan