Sciweavers

1176 search results - page 197 / 236
» Exploiting Online Games
Sort
View
94
Voted
NIPS
1994
15 years 1 months ago
Reinforcement Learning with Soft State Aggregation
It is widely accepted that the use of more compact representations than lookup tables is crucial to scaling reinforcement learning (RL) algorithms to real-world problems. Unfortun...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
99
Voted
AAMAS
2007
Springer
15 years 18 days ago
An experts approach to strategy selection in multiagent meeting scheduling
Abstract. In the multiagent meeting scheduling problem, agents negotiate with each other on behalf of their users to schedule meetings. While a number of negotiation approaches hav...
Elisabeth Crawford, Manuela M. Veloso
109
Voted
CGF
2008
129views more  CGF 2008»
15 years 17 days ago
Sequential Monte Carlo Adaptation in Low-Anisotropy Participating Media
This paper presents a novel method that effectively combines both control variates and importance sampling in a sequential Monte Carlo context. The radiance estimates computed dur...
Vincent Pegoraro, Ingo Wald, Steven G. Parker
94
Voted
ENTCS
2006
112views more  ENTCS 2006»
15 years 15 days ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
94
Voted
IJMMS
2008
131views more  IJMMS 2008»
15 years 14 days ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...