Sciweavers

1893 search results - page 335 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
14 years 1 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
KIVS
2005
Springer
14 years 1 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...
SIGMETRICS
2004
ACM
14 years 1 months ago
Storage device performance prediction with CART models
d Abstract] Mengzhi Wang, Kinman Au, Anastassia Ailamaki, Anthony Brockwell, Christos Faloutsos, and Gregory R. Ganger Carnegie Mellon University This work explores the applicatio...
Mengzhi Wang, Kinman Au, Anastassia Ailamaki, Anth...
VAST
2004
ACM
14 years 1 months ago
Digital reconstruction of the Arrigo VII funerary complex
The results of a project aimed to the study, reconstruction and presentation to the public of a monument disassembled and dispersed, the mausoleum of the emperor Arrigo VII, are p...
Clara Baracchini, Antonio Brogi, Marco Callieri, L...
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
14 years 1 months ago
Design and Implementation of a Semantic Peer-to-Peer Network
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for large-scale information retrieval and search systems due to scalability, fault-tolera...
Kiyohide Nakauchi, Hiroyuki Morikawa, Tomonori Aoy...