Sciweavers

2066 search results - page 379 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
ACSC
2004
IEEE
14 years 24 days ago
On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma
Table 1 shows the payoff to player one. The same matrix also holds for player two. Player one can gain the maximum 5 points (T = 5) by defection if player two cooperates. However,...
Daniel Jang, Peter A. Whigham, Grant Dick
JUCS
2010
109views more  JUCS 2010»
13 years 3 months ago
Semantics of Query-Driven Communication of Exact Values
: We address the question of how to communicate among distributed processes values such as real numbers, continuous functions and geometrical solids with arbitrary precision, yet e...
Michal Konecný, Amin Farjudian
CVPR
2004
IEEE
14 years 11 months ago
Automatic Method for Correlating Horizons across Faults in 3D Seismic Data
Horizons are visible boundaries between certain sediment layers in seismic data, and a fault is a crack of horizons and it is recognized in seismic data by the discontinuities of ...
Fitsum Admasu, Klaus D. Tönnies
ENTCS
2006
168views more  ENTCS 2006»
13 years 9 months ago
A Functional Programming Framework for Latency Insensitive Protocol Validation
Latency insensitive protocols (LIPs) have been proposed as a viable means to connect synchronous IP blocks via long interconnects in a system-on-chip. The reason why one needs to ...
Syed Suhaib, Deepak Mathaikutty, Sandeep K. Shukla...
JCB
2000
146views more  JCB 2000»
13 years 8 months ago
Bayesian Segmentation of Protein Secondary Structure
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag