Sciweavers

302 search results - page 21 / 61
» Playing by the rules
Sort
View
TARK
2007
Springer
14 years 1 months ago
Explaining quantity implicatures
We give derivations of two formal models of Gricean Quantity1 implicature and strong exhaustivity (Van Rooij and Schulz, 2004; Schulz and Van Rooij, 2006), in bidirectional optima...
Tikitu de Jager, Robert van Rooij
BCSHCI
2008
13 years 9 months ago
Walk 2 Win: towards designing a mobile game for elderly's social engagement
In this paper we describe a user-centered approach to designing and evaluating a socially interactive mobile game for the elderly. The objective of the game is to encourage the el...
Omar Mubin, Suleman Shahid, Abdullah Al Mahmud
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 27 days ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
CORR
2010
Springer
187views Education» more  CORR 2010»
13 years 7 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao
ICASSP
2011
IEEE
12 years 11 months ago
Logarithmic weak regret of non-Bayesian restless multi-armed bandit
Abstract—We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. At each time, a player chooses K out of N (N > K) arms to play. The state of each ar...
Haoyang Liu, Keqin Liu, Qing Zhao