Sciweavers

690 search results - page 89 / 138
» Multi-Agent Only Knowing
Sort
View
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Mining Recurring Events Through Forest Growing
Recurring events are short temporal patterns that consist of multiple instances in the target database. Without any a priori knowledge of the recurring events, in terms of their le...
Junsong Yuan, Jingjing Meng, Ying Wu, Jiebo Luo
TKDE
2008
117views more  TKDE 2008»
13 years 8 months ago
Competitor Mining with the Web
This paper is concerned with the problem of mining competitors from the Web automatically. Nowadays, the fierce competition in the market necessitates every company to know not onl...
Shenghua Bao, Rui Li, Yong Yu, Yunbo Cao
TKDE
2008
111views more  TKDE 2008»
13 years 8 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
JCP
2007
118views more  JCP 2007»
13 years 8 months ago
Tutoring an Entire Game with Dynamic Strategy Graphs: The Mixed-Initiative Sudoku Tutor
Abstract— In this paper, we develop a mixed-initiative intelligent tutor for the game of Sudoku called MITS. We begin by developing a characterization of the strategies used in S...
Allan Caine, Robin Cohen
TROB
2008
97views more  TROB 2008»
13 years 8 months ago
Physical Path Planning Using a Pervasive Embedded Network
Abstract--We evaluate a technique that uses an embedded network deployed pervasively throughout an environment to aid robots in navigation. The embedded nodes do not know their abs...
Keith J. O'Hara, Daniel B. Walker, Tucker R. Balch