Sciweavers

2912 search results - page 574 / 583
» Logistic Model Trees
Sort
View
ATAL
2008
Springer
13 years 11 months ago
GS3 and Tartanian: game theory-based heads-up limit and no-limit Texas Hold'em poker-playing programs
We demonstrate two game theory-based programs for headsup limit and no-limit Texas Hold'em poker. The first player, GS3, is designed for playing limit Texas Hold'em, in ...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
CCS
2008
ACM
13 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
DIALM
2005
ACM
125views Algorithms» more  DIALM 2005»
13 years 11 months ago
Minimizing interference in ad hoc and sensor networks
Reducing interference is one of the main challenges in wireless communication, and particularly in ad hoc networks. The amount of interference experienced by a node v corresponds ...
Thomas Moscibroda, Roger Wattenhofer
CSCLP
2008
Springer
13 years 11 months ago
An Efficient Decision Procedure for Functional Decomposable Theories Based on Dual Constraints
Abstract. Over the last decade, first-order constraints have been efficiently used in the artificial intelligence world to model many kinds of complex problems such as: scheduling,...
Khalil Djelloul
SDM
2008
SIAM
130views Data Mining» more  SDM 2008»
13 years 11 months ago
Mining Sequence Classifiers for Early Prediction
Supervised learning on sequence data, also known as sequence classification, has been well recognized as an important data mining task with many significant applications. Since te...
Zhengzheng Xing, Jian Pei, Guozhu Dong, Philip S. ...