Sciweavers

7839 search results - page 1255 / 1568
» What's there and what's not
Sort
View
137
Voted
CISS
2010
IEEE
14 years 5 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
AGI
2011
14 years 5 months ago
Three Hypotheses about the Geometry of Mind
What set of concepts and formalizations might one use to make a practically useful, theoretically rigorous theory of generally intelligent systems? We present a novel perspective m...
Ben Goertzel, Matthew Iklé
AIED
2011
Springer
14 years 5 months ago
Faster Teaching by POMDP Planning
Both human and automated tutors must infer what a student knows and plan future actions to maximize learning. Though substantial research has been done on tracking and modeling stu...
Anna N. Rafferty, Emma Brunskill, Thomas L. Griffi...
AINA
2011
IEEE
14 years 5 months ago
Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web
—Currently the user’s web search is disjoint from the resources which is subsequently browsed. Specifically the related instances of the search are not displayed on the followi...
Kevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxto...
AIPS
2011
14 years 5 months ago
Visual Programming of Plan Dynamics Using Constraints and Landmarks
In recent years, there has been considerable interest in the use of planning techniques in new media and computer games. Many traditional planning notions no longer apply in the c...
Julie Porteous, Jonathan Teutenberg, David Pizzi, ...
« Prev « First page 1255 / 1568 Last » Next »