Sciweavers

4529 search results - page 845 / 906
» Position Based Cryptography
Sort
View
95
Voted
SIGECOM
2005
ACM
97views ECommerce» more  SIGECOM 2005»
15 years 6 months ago
Complexity of (iterated) dominance
We study various computational aspects of solving games using dominance and iterated dominance. We first study both strict and weak dominance (not iterated), and show that checki...
Vincent Conitzer, Tuomas Sandholm
121
Voted
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
ARCS
2005
Springer
15 years 6 months ago
Adaptive Object Acquisition
We propose an active vision system for object acquisition. The core of our approach is a reinforcement learning module which learns a strategy to scan an object. The agent moves a...
Gabriele Peters, Claus-Peter Alberts, Markus Bries...
135
Voted
ATAL
2005
Springer
15 years 6 months ago
Improving reinforcement learning function approximators via neuroevolution
Reinforcement learning problems are commonly tackled with temporal difference methods, which use dynamic programming and statistical sampling to estimate the long-term value of ta...
Shimon Whiteson
108
Voted
CAIP
2005
Springer
15 years 6 months ago
Virtual Garment Pre-positioning
In this paper, we present an easy method for automatic 3D garment pre-positioning. Given a digital 3D mannequin and a set of 2D patterns, the problem consists in sewing automatical...
Tung Le Thanh, André Gagalowicz