Sciweavers

13895 search results - page 2661 / 2779
» Exploration
Sort
View
CORR
2007
Springer
106views Education» more  CORR 2007»
13 years 8 months ago
Bandit Algorithms for Tree Search
Bandit based methods for tree search have recently gained popularity when applied to huge trees, e.g. in the game of go [6]. Their efficient exploration of the tree enables to ret...
Pierre-Arnaud Coquelin, Rémi Munos
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 8 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
CORR
2007
Springer
141views Education» more  CORR 2007»
13 years 8 months ago
Acyclicity of Preferences, Nash Equilibria, and Subgame Perfect Equilibria: a Formal and Constructive Equivalence
Abstract. Sequential game and Nash equilibrium are basic key concepts in game theory. In 1953, Kuhn showed that every sequential game has a Nash equilibrium. The two main steps of ...
Stéphane Le Roux
JCST
2008
124views more  JCST 2008»
13 years 8 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
CORR
2007
Springer
132views Education» more  CORR 2007»
13 years 8 months ago
Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study
—Established in 2005, YouTube has become the most successful Internet site providing a new generation of short video sharing service. Today, YouTube alone comprises approximately...
Xu Cheng, Cameron Dale, Jiangchuan Liu
« Prev « First page 2661 / 2779 Last » Next »