Sciweavers

3155 search results - page 48 / 631
» How Are You Doing
Sort
View

Tutorial
4472views
14 years 6 months ago
An Introduction to Encog Neural Networks for Java
This article provides a basic introduction to neural networks and neural network programming using the Encog Artificial Intelligence Framework. Encog is an AI framework that is ava...
Jeff Heaton
IEEEPACT
2003
IEEE
14 years 28 days ago
Y-Branches: When You Come to a Fork in the Road, Take It
In this paper, we study the effects of manipulating the architected direction of conditional branches. Through the use of statistical sampling, we find that about 40% of all dyna...
Nicholas J. Wang, Michael Fertig, Sanjay J. Patel
ATAL
2008
Springer
13 years 9 months ago
If I were you: double appraisal in affective agents
We report the implementation and evaluation of a Simulation Theory (ST) approach to the Theory of Mind in intelligent graphical agents driven by an affective agent architecture FA...
Ruth Aylett, Sandy Louchart
COMBINATORICS
2004
54views more  COMBINATORICS 2004»
13 years 7 months ago
When Can You Tile a Box With Translates of Two Given Rectangular Bricks?
When can a d-dimensional rectangular box R be tiled by translates of two given d-dimensional rectangular bricks B1 and B2? We prove that R can be tiled by translates of B1 and B2 ...
Richard J. Bower, T. S. Michael
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao