Sciweavers

1557 search results - page 73 / 312
» What can we do with a Solution
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
ECAI
2004
Springer
14 years 1 months ago
Avatars That Learn How to Behave
It is possible to model avatars that learn to simulate object manipulations and other complex actions. A number of applications may benefit from this technique including safety, e...
Adam Szarowicz, Paolo Remagnino
VL
2010
IEEE
160views Visual Languages» more  VL 2010»
13 years 6 months ago
Toward End-User Debugging of Machine-Learned Classifiers
Many machine-learning algorithms learn rules of behavior from individual end users, such as taskoriented desktop organizers and handwriting recognizers. These rules form a generat...
Todd Kulesza
ARGMAS
2008
Springer
13 years 9 months ago
Personality-Based Practical Reasoning
In virtual training scenarios, agent technology can be used to build a virtual tutor that assists a student during training. In a dialogue using argumentation schemes, the virtual ...
Thomas L. van der Weide, Frank Dignum, John-Jules ...
AGI
2008
13 years 9 months ago
Artificial general intelligence: an organism and level based position statement
Abstract. Do simple animals, even single-celled animals, display general intelligence? If we take this to mean that they can cope with their environment, even when it is dynamic, t...
Leslie S. Smith