Abstract-- In recent years underwater survey and surveillance missions with more than a single Autonomous Underwater Vehicle (AUV) have become more common thanks to more reliable a...
Maurice F. Fallon, Georgios Papadopoulos, John J. ...
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
— We consider 1-helper problem in which one source provides partial side information to the fusion center (FC) to help reconstruction of the main source signal. Both sources comm...
We describe the Agents Channelling ContExt Sensitive Services (ACCESS) architecture, an open agent-based architecture that supports the development and deployment of multiple heter...
Robin Strahan, Gregory M. P. O'Hare, Conor Muldoon...
This paper examines, by argument, the dynamics of sequences of behavioural choices made, when non-cooperative restricted-memory agents learn in partially observable stochastic gam...