In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
In this paper, we use computational intelligence techniques to built quantitative models of player experience for a platform game. The models accurately predict certain key affecti...
Christopher Pedersen, Julian Togelius, Georgios N....
An operational framework is developed for testing stationarity relatively to an observation scale, in both stochastic and deterministic contexts. The proposed method is based on a ...
Pierre Borgnat, Patrick Flandrin, Paul Honeine, C&...
In previous work, a water-filling algorithm was proposed which sought to minimize the mean square error (MSE) at any given time by optimally choosing the gains (i.e. step-sizes) ...