Sciweavers

Share
AAAI
2015
4 years 6 months ago
Steering Evolution Strategically: Computational Game Theory and Opponent Exploitation for Treatment Planning, Drug Design, and S
Living organisms adapt to challenges through evolution and adaptation. This has proven to be a key difficulty in developing therapies, since the organisms develop resistance. I p...
Tuomas Sandholm
AAAI
2015
4 years 6 months ago
Real-Time Symbolic Dynamic Programming
Recent advances in Symbolic Dynamic Programming (SDP) combined with the extended algebraic decision diagram (XADD) have provided exact solutions for expressive subclasses of fini...
Luis Gustavo Rocha Vianna, Leliane N. de Barros, S...
4OR
2015
4 years 6 months ago
Essays on spatial coalition formation theory
: Consecutive political crises in Belgium during the periods 2007-2008 and 2010-2011 demonstrated the importance of coalition formation and the necessity for a good understanding o...
Tom Blockmans
3DTV
2015
13views more  3DTV 2015»
4 years 6 months ago
Estimation of temporally-consistent depth maps from video with reduced noise
This paper presents novel results on temporally consistent depth estimation with the use of noise removal from video. Basing on the prior works, a novel, more advanced noise reduc...
Olgierd Stankiewicz, Marek Domanski, Krzysztof Weg...
DFN
2013
5 years 4 months ago
CASA - Ein Konzept zur nutzergetriebenen, kontextbasierten Dienstintegration in Lehr- und Lernumgebungen
: An Hochschulen ist heute eine hochgradig heterogene IT-Landschaft mit Diensten und Web-Anwendungen etabliert. Durch die gewachsenen Strukturen an vielen Fakult¨aten und die h¨a...
Philipp Lehsten, Djamshid Tavangarian

0
posts
with
0
views
287profile views
evelienStudent, Msc
evelien

0
posts
with
0
views
188profile views
stefano.mIndependent Researcher
DEIS - Alma Mater Studiorum, Università di Bologna
stefano.m

Publication
233views
8 years 8 months ago
Sparse reward processes
We introduce a class of learning problems where the agent is presented with a series of tasks. Intuitively, if there is relation among those tasks, then the information gained duri...
Christos Dimitrakakis
TISSEC
2010
237views more  TISSEC 2010»
9 years 4 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
TCOS
2010
9 years 4 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
books