Sciweavers

2086 search results - page 200 / 418
» Mathematical Theory Exploration
Sort
View
144
Voted
COLT
2003
Springer
15 years 9 months ago
Preference Elicitation and Query Learning
Abstract. In this paper we initiate an exploration of relationships between “preference elicitation”, a learning-style problem that arises in combinatorial auctions, and the pr...
Avrim Blum, Jeffrey C. Jackson, Tuomas Sandholm, M...
DIGRA
2003
Springer
15 years 9 months ago
The attack of the backstories (and why they won't win)
This essay adopts a formal model of play as semiosis [18] to explore the often dysfunctional role of backstories within computer game design and play. Within this model, backstori...
David Myers
FSTTCS
2003
Springer
15 years 9 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
SCALESPACE
2001
Springer
15 years 8 months ago
Bayesian Object Detection through Level Curves Selection
Bayesian statistical theory is a convenient way of taking a priori information into consideration when inference is made from images. In Bayesian image detection, the a priori dist...
Charles Kervrann
CSEE
2006
Springer
15 years 7 months ago
Making Every Student a Winner: The WinWin Approach in Software Engineering Education
This paper shows how Theory-W and the WinWin requirements negotiation approach are used in software engineering education at several universities in the US, Europe, and Asia. We b...
Paul Grünbacher, Norbert Seyff, Robert O. Bri...