Amanote Research

Amanote Research

    RegisterSign In

Explore, Excogitate, Exploit: Component Mining

Computer - United States
doi 10.1109/2.789756
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer Science
Date

January 1, 1999

Authors
D. Spinellis
Publisher

Institute of Electrical and Electronics Engineers (IEEE)


Related search

Disturbance Modifies Payoffs in the Explore-Exploit Trade-Off

Nature Communications
AstronomyGeneticsMolecular BiologyBiochemistryChemistryPhysics
2019English

Healthcare Trajectory Mining by Combining Multidimensional Component and Itemsets

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Institutional Component of Legal Provision of Ecological Safety of Coal Mining

Economics and Law
2020English

Compromising Windows 8 With Metasploit’s Exploit

IOSR Journal of Computer Engineering
2012English

Learning How to Exploit Sources of Information

Memory and Cognition
ArtsNeuropsychologyCognitive PsychologyHumanitiesPhysiological PsychologyMedicineExperimental
2018English

Hierarchical Decision Diagrams to Exploit Model Structure

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Explore and Discover

Music Educators Journal
1977English

Trawling Bats Exploit an Echo-Acoustic Ground Effect

Frontiers in Physiology
Physiology
2013English

Migrating Whales Depend on Memory to Exploit Reliable Resources

Proceedings of the National Academy of Sciences of the United States of America
Multidisciplinary
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy