—The current cellular networks have evolved to be more randomly, irregularly, and heterogeneously deployed to meet the exponential growth of mobile data traffic and the demand f...
—In this paper, a downlink single-cell non-orthogonal multiple access (NOMA) network with uniformly deployed users is considered and an analytical framework to evaluate its perfo...
Zheng Yang, Zhiguo Ding, Pingzhi Fan, George K. Ka...
—Game competitions may involve different player roles and be score-based rather than win/loss based. This raises the issue of how best to draw opponents for matches in ongoing co...
Spyridon Samothrakis, Diego Perez Liebana, Simon M...
—The adversarial character of real-time strategy (RTS) games is one of the main sources of uncertainty within this domain. Since players lack exact knowledge about their opponent...
—Learning board games by self-play has a long tradition in computational intelligence for games. Based on Tesauro’s seminal success with TD-Gammon in 1994, many successful agen...
Samineh Bagheri, Markus Thill, Patrick Koch, Wolfg...
— Game-based competitions are commonly used within the Computational Intelligence (CI) and Artificial Intelligence (AI) in games community to benchmark algorithms and to attract...
Abstract. Entity-based searching has been introduced as a way of allowing users and applications to retrieve information about a specific real world object such as a person, an ev...
Secret-key authentication protocols have recently received a considerable amount of attention, and a long line of research has been devoted to devising efficient protocols with sec...
About three decades ago it was realized that implementing private channels between parties which can be adaptively corrupted requires an encryption scheme that is secure against s...
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzyszt...