Sciweavers

244 search results - page 35 / 49
» Poly-Functional Intelligent Agents for Computer Generated Fo...
Sort
View
AAAI
2012
11 years 10 months ago
Double-Bit Quantization for Hashing
Hashing, which tries to learn similarity-preserving binary codes for data representation, has been widely used for efficient nearest neighbor search in massive databases due to i...
Weihao Kong, Wu-Jun Li
ICDCSW
2003
IEEE
14 years 1 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra
ESSMAC
2003
Springer
14 years 29 days ago
Filtered Gaussian Processes for Learning with Large Data-Sets
Kernel-based non-parametric models have been applied widely over recent years. However, the associated computational complexity imposes limitations on the applicability of those me...
Jian Qing Shi, Roderick Murray-Smith, D. M. Titter...
ATAL
2010
Springer
13 years 8 months ago
Evaluating directorial control in a character-centric interactive narrative framework
Interactive narrative allows the user to play a role in a story and interact with other characters controlled by the system. Directorial control is a procedure for dynamically tun...
Mei Si, Stacy C. Marsella, David V. Pynadath
ATAL
2010
Springer
13 years 8 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...