Sciweavers

3319 search results - page 622 / 664
» Type Theoretical Databases
Sort
View
133
Voted
IJCAI
1989
15 years 3 months ago
Bidirectional Use of Knowledge in the Multi-modal NL Access System XTRA
The acceptability and effectiveness of an expert system is critically dependent on its user interface. Natural language could be a well-suited communicative medium; however, curre...
Jürgen Allgayer, Roman M. Jansen-Winkeln, Car...
129
Voted
ATAL
2010
Springer
15 years 3 months ago
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mod...
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintve...
120
Voted
DGO
2008
112views Education» more  DGO 2008»
15 years 3 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
120
Voted
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
15 years 3 months ago
A no-free-lunch framework for coevolution
The No-Free-Lunch theorem is a fundamental result in the field of black-box function optimization. Recent work has shown that coevolution can exhibit free lunches. The question a...
Travis C. Service, Daniel R. Tauritz
SIGCOMM
2010
ACM
15 years 2 months ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...