Sciweavers

5410 search results - page 1039 / 1082
» When to Cross Over
Sort
View
AAMAS
2005
Springer
13 years 9 months ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
IJMMS
2007
163views more  IJMMS 2007»
13 years 9 months ago
Beyond ontologies: Toward situated representations of scientific knowledge
: In information systems that support knowledge-discovery applications such as scientific exploration, reliance on highly structured ontologies as data-organization aids can be lim...
William Pike, Mark Gahegan
IJON
2007
74views more  IJON 2007»
13 years 9 months ago
Visual object concept discovery: Observations in congenitally blind children, and a computational approach
Over the course of the first few months of life, our brains accomplish a remarkable feat. They are able to interpret complex visual images so that instead of being just disconnec...
Jake V. Bouvrie, Pawan Sinha
IJRR
2007
100views more  IJRR 2007»
13 years 9 months ago
Exactly Sparse Extended Information Filters for Feature-based SLAM
Recent research concerning the Gaussian canonical form for Simultaneous Localization and Mapping (SLAM) has given rise to a handful of algorithms that attempt to solve the SLAM sc...
Matthew Walter, Ryan Eustice, John J. Leonard
TC
2008
13 years 9 months ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin
« Prev « First page 1039 / 1082 Last » Next »