This paper focuses on an investigation of Collaborative Virtual Environment (CVE) technology for people with autism, paying particular attention to the use of avatar representatio...
Yufang Cheng, David J. Moore, Paul McGrath, Yulei ...
If one possesses a model of a controlled deterministic system, then from any state, one may consider the set of all possible reachable states starting from that state and using any...
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Location systems are core technologies for enabling pervasive computing smart spaces. Signal Strength based location estimation offers economical viability and sufficient accurac...
This paper investigates reinforcement learning (RL) in XCS. First, it formally shows that XCS implements a method of generalized RL based on linear approximators, in which the usu...