• No results found

The Fully Enclosed UCT Algorithm and Its

The UCT Algorithm Applied to Games with Imperfect Information

The UCT Algorithm Applied to Games with Imperfect Information

... The tournament simulation arena was implemented with C++. It has an object oriented design which has multiple advantages. SkatTA can call the player functions through a defined interface. New player types can be included ...

83

A Fully Unsupervised Texture Segmentation Algorithm

A Fully Unsupervised Texture Segmentation Algorithm

... Figure 2: Mean shift convergence of data points readers are referred to Comaniciu and Meer [7]. However, Comaniciu and Meer used a simple nearest neighbour clustering to associate each data point to its cluster ...

10

A fully-parallel turbo decoding algorithm

A fully-parallel turbo decoding algorithm

... to its significantly increased parallelism, the proposed algorithm facilitates throughputs and latencies that are up to ...art algorithm, when employed for the LTE and WiMAX turbo ...proposed ...

12

An O(n) Time Algorithm for Scheduling UET UCT of Bipartite Digraphs of Depth One on Two Processors

An O(n) Time Algorithm for Scheduling UET UCT of Bipartite Digraphs of Depth One on Two Processors

... on its structure: the time of execution of every task is one unit execution time (UET), the number of processors m is fixed, the communica- tion delays are neglected, constant or one unit (UCT), or special ...

6

Robust and Efficient Fully Parallel 2D Thinning Algorithm

Robust and Efficient Fully Parallel 2D Thinning Algorithm

... proposed algorithm was tested and its results are compared with [7] algorithm which is an improved version of [6] algorithm, the fully parallel FP-Isthmus based algorithm [1] and ...

6

A Fully Dynamic Algorithm for k-regret Minimizing Sets

A Fully Dynamic Algorithm for k-regret Minimizing Sets

... Effect of k: The results for k-RMS with varying k from 1 to 5 are illustrated in Fig. 7. We only compare FD-RMS with G REEDY ∗ , ε-K ERNEL , and HS because other algorithms are not applicable to the case when k > 1. ...

12

Preliminary Assessment Of A Wave Energy Conversion Principle, Using Fully Enclosed Multi-Axis Inertial Reaction Mechanisms

Preliminary Assessment Of A Wave Energy Conversion Principle, Using Fully Enclosed Multi-Axis Inertial Reaction Mechanisms

... 5. Conclusion As it results, the linear motion of the centre of mass of the suspended body and the suspension geometry enables the introduction of a quite simple form of a PTO mechanism, rendering this de- sign far more ...

9

A fully linear-time approximation algorithm for grammar-based compression

A fully linear-time approximation algorithm for grammar-based compression

... Example 3. Fig. 5 illustrates the convergence of a long prefix case. Let a string w contain 8 independent intervals which have the same prefix ‘abcdefg’ and this prefix be decreasing. The 1–8 rows represent such 8 ...

15

Design and Implementation of a Fully Distributed Caching Algorithm on an NDN System

Design and Implementation of a Fully Distributed Caching Algorithm on an NDN System

... The current model that the internet is built upon is an IP (Internet Protocol) system in which data packets are associated with specific IP addresses and are transferred via direct host- to-host communication. While this ...

24

Fault tolerant routing algorithm for fully- and partially-defective NoC switches

Fault tolerant routing algorithm for fully- and partially-defective NoC switches

... Now, we will show that the case will never happen. The reason that there is no connection between channel 1 and channel 2 is that any packet traveling from south to north will never use the east boundary of a ring except ...

71

Fully automatic algorithm for the analysis of vessels in the angiographic image of the eye fundus

Fully automatic algorithm for the analysis of vessels in the angiographic image of the eye fundus

... There exists a large number of papers connected with the analysis and processing of the eye fundus images. The methods of image analysis and processing described in them are profiled to enhance segmentation of vessels. ...

19

A Fully-Distributed Heuristic Algorithm for Control of Autonomous Vehicle Movements at Isolated Intersections

A Fully-Distributed Heuristic Algorithm for Control of Autonomous Vehicle Movements at Isolated Intersections

... One of the key research efforts is the work of Dresner and Stone [9, 10] where a centralized multi-agent reservation-based intersection control protocol was presented. The protocol simply depended on a central management ...

13

An Efficient Fully Dynamic Algorithm to Optimize the Task Scheduling Activities in Cloud Systems

An Efficient Fully Dynamic Algorithm to Optimize the Task Scheduling Activities in Cloud Systems

... After the grouping, the tasks can be measured for their priority levels and further scheduled as per priority levels. B. Prioritization The importance factor of the associated element/component is decided by its ...

5

Fully Automated R-peak Detection Algorithm (FLORA) for Fetal Magnetoencephalographic Data

Fully Automated R-peak Detection Algorithm (FLORA) for Fetal Magnetoencephalographic Data

... to the real heart rate in each dataset. It is also aimed to eliminate erroneously detected heart beats and fill in missing peaks automatically to evaluate fMEG data rapidly and at the same time as effectively as manual ...

18

Entanglement and its Role in Shor's Algorithm

Entanglement and its Role in Shor's Algorithm

... factoring algorithm, can achieve ex- ponentially better performance than their classical ...not fully understood: here we use numer- ical simulation to investigate how entanglement between register qubits ...

11

UCT Guest House UCT Management Course course. Information pack

UCT Guest House UCT Management Course course. Information pack

... the UCT Guest House Management course ...From its humble beginnings over a decade ago, the industry has now become highly competitive and professional, demanding experience and knowledge of professional ...

6

UCT partnership agreements

UCT partnership agreements

... Norway University of Bergen To run indefinitely from 2007 Undergraduate and postgraduate students exchange; study abroad; research collaboration; Worldwide University Network P[r] ...

16

Astronomy & Teaching Programs at UCT

Astronomy & Teaching Programs at UCT

... - Research focus: Stellar Astrophysics (compact binaries), Extragalactic Astronomy (distance scale, large-scale structures, galaxy dynamics, DM) Cosmology (DE, modified gr[r] ...

19

UCT. Honours. Projects Proposal

UCT. Honours. Projects Proposal

... Folders or Directories. This gets archived via something called domains and subdomains that point to certain folders through a method called web-­‐server visualization. This means, in an Enterprise Organization that ...

24

Convergence of UCT in Imperfect Information Games

Convergence of UCT in Imperfect Information Games

... of UCT, but the first player plays strategy nearer the Nash equilibria than the non-deterministic modification of ...classic UCT. This fact makes Sliding Window look as an algorithm which very fast ...

49

Show all 10000 documents...

Related subjects