Sciweavers

1285 search results - page 201 / 257
» Topology and Intelligent Data Analysis
Sort
View
ATAL
2009
Springer
14 years 4 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ATAL
2006
Springer
14 years 1 months ago
Magenta technology multi-agent logistics i-Scheduler for road transportation
The paper describes main features of an Intelligent Scheduler for Road Transportation Applications based on Magenta agent technology and characterized by a number of unique, advan...
Jonathan Himoff, George Rzevski, Petr Skobelev
HT
2009
ACM
14 years 4 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
SIGGRAPH
1999
ACM
14 years 2 months ago
Voice Puppetry
We introduce a method for predicting a control signal from another related signal, and apply it to voice puppetry: Generating full facial animation from expressive information in ...
Matthew Brand
CMG
2001
13 years 11 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski