Sciweavers

192 search results - page 13 / 39
» An autonomous explore exploit strategy
Sort
View
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 9 months ago
Evaluating and Improving Modern Variable and Revision Ordering Strategies in CSPs
A key factor that can dramatically reduce the search space during constraint solving is the criterion under which the variable to be instantiated next is selected. For this purpos...
Thanasis Balafoutis, Kostas Stergiou
NOSSDAV
2005
Springer
14 years 2 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
ICRA
2010
IEEE
162views Robotics» more  ICRA 2010»
13 years 7 months ago
Comparing and modeling distributed control strategies for miniature self-assembling robots
— We propose two contrasting approaches to the scalable distributed control of a swarm of self-assembling miniaturized robots, specifically the formation of chains of a desired ...
William C. Evans, Grégory Mermoud, Alcherio...
CLADE
2003
IEEE
14 years 2 months ago
vGrid: A Framework For Building Autonomic Applications
With rapid technological advances in network infrastructure, programming languages, compatible component interfaces and so many more areas, today the computational Grid has evolve...
Bithika Khargharia, Salim Hariri, Manish Parashar,...
CORR
2004
Springer
119views Education» more  CORR 2004»
13 years 8 months ago
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a limited set of sources by using traceroute-like probes. This methodology, akin to the merging of different s...
Luca Dall'Asta, J. Ignacio Alvarez-Hamelin, Alain ...