Sciweavers

3318 search results - page 79 / 664
» The Weak Instance Model
Sort
View
AAAI
2008
13 years 10 months ago
Turning Web Text and Search Queries into Factual Knowledge: Hierarchical Class Attribute Extraction
A seed-based framework for textual information extraction allows for weakly supervised acquisition of open-domain class attributes over conceptual hierarchies, from a combination ...
Marius Pasca
ATAL
2010
Springer
13 years 9 months ago
High-level reinforcement learning in strategy games
Video games provide a rich testbed for artificial intelligence methods. In particular, creating automated opponents that perform well in strategy games is a difficult task. For in...
Christopher Amato, Guy Shani
ANOR
2008
69views more  ANOR 2008»
13 years 8 months ago
NP-hardness results for the aggregation of linear orders into median orders
Abstract Given a collection of individual preferences defined on a same finite set of candidates, we consider the problem of aggregating them into a collective preference minimizin...
Olivier Hudry
IJNSEC
2011
116views more  IJNSEC 2011»
13 years 2 months ago
An Authentication Protocol Based on Kerberos 5
We introduce some modifications to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak...
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama S. ...
MCAM
2007
Springer
127views Multimedia» more  MCAM 2007»
14 years 2 months ago
An Optimized Topology Maintenance Framework for P2P Media Streaming
In this paper, we present an optimized topology maintenance framework used in AVStreamer P2P media streaming system. To help new incoming clients get an initial view of the whole n...
Rui Guo, Longshe Huo, Qiang Fu, Shuangjia Chen, We...