Sciweavers

601 search results - page 76 / 121
» Playing large games using simple strategies
Sort
View
DBSEC
2007
106views Database» more  DBSEC 2007»
15 years 2 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
JSAC
2008
125views more  JSAC 2008»
15 years 1 months ago
Optimal Competitive Algorithms for Opportunistic Spectrum Access
We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter must...
Nicholas B. Chang, Mingyan Liu
NIS
1998
131views more  NIS 1998»
15 years 1 months ago
Dynamic Memory Allocation for Large Query Execution
The execution time of a large query depends mainly on the memory utilization which should avoid disk accesses for intermediate results. Poor memory management can hurt performance ...
Luc Bouganim, Olga Kapitskaia, Patrick Valduriez
CHI
2006
ACM
16 years 1 months ago
Integrating models of human-computer visual interaction
Predicting visual search behavior in human-computer interaction is a challenging problem. It is important for predictive modeling of human-computer interaction to integrate the vi...
Tim Halverson
ICMLA
2009
14 years 11 months ago
Multiagent Transfer Learning via Assignment-Based Decomposition
We describe a system that successfully transfers value function knowledge across multiple subdomains of realtime strategy games in the context of multiagent reinforcement learning....
Scott Proper, Prasad Tadepalli