Sciweavers

1734 search results - page 232 / 347
» What works
Sort
View
ATAL
2010
Springer
15 years 1 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
93
Voted
CLEF
2010
Springer
15 years 1 months ago
A Question Answering System based on Information Retrieval and Validation
Abstract. Our participation at ResPubliQA 2010 was based on applying an Information Retrieval (IR) engine of high performance and a validation step for removing incorrect answers. ...
Álvaro Rodrigo, Joaquín Pérez...
105
Voted
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
15 years 1 months ago
Multi-agent task allocation: learning when to say no
This paper presents a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Exper...
Adam Campbell, Annie S. Wu, Randall Shumaker
GECON
2008
Springer
152views Business» more  GECON 2008»
15 years 1 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer
AAAI
2010
15 years 1 months ago
The Boosting Effect of Exploratory Behaviors
Active object exploration is one of the hallmarks of human and animal intelligence. Research in psychology has shown that the use of multiple exploratory behaviors is crucial for ...
Jivko Sinapov, Alexander Stoytchev