Sciweavers

14190 search results - page 2645 / 2838
» computing 2008
Sort
View
140
Voted
ICGA
2008
208views Optimization» more  ICGA 2008»
15 years 3 months ago
Cross-Entropy for Monte-Carlo Tree Search
Recently, Monte-Carlo Tree Search (MCTS) has become a popular approach for intelligent play in games. Amongst others, it is successfully used in most state-of-the-art Go programs....
Guillaume Chaslot, Mark H. M. Winands, Istvan Szit...
220
Voted
IR
2008
15 years 3 months ago
Output-sensitive autocompletion search
We consider the following autocompletion search scenario: imagine a user of a search engine typing a query; then with every keystroke display those completions of the last query wo...
Holger Bast, Christian Worm Mortensen, Ingmar Webe...
129
Voted
ISI
2008
Springer
15 years 3 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ISM
2008
IEEE
155views Multimedia» more  ISM 2008»
15 years 3 months ago
Whiteboard Content Extraction and Analysis for the Classroom Environment
We describe whiteboard content capture system from Presentations Automatically Organized from Lectures (PAOL) that captures content within the setting of a classroom environment. ...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
JBI
2008
15 years 3 months ago
The Field Representation Language
The complexity of quantitative biomedical models, and the rate at which they are published, is increasing to a point where managing the information has become all but impossible w...
Guy Tsafnat
« Prev « First page 2645 / 2838 Last » Next »