Sciweavers

TCOM
2016
10 years 18 days ago
Approximate SIR Analysis in General Heterogeneous Cellular Networks
—The current cellular networks have evolved to be more randomly, irregularly, and heterogeneously deployed to meet the exponential growth of mobile data traffic and the demand f...
Haichao Wei, Na Deng, Wuyang Zhou, Martin Haenggi
TCOM
2016
10 years 18 days ago
On the Performance of Non-orthogonal Multiple Access Systems With Partial Channel Information
—In this paper, a downlink single-cell non-orthogonal multiple access (NOMA) network with uniformly deployed users is considered and an analytical framework to evaluate its perfo...
Zheng Yang, Zhiguo Ding, Pingzhi Fan, George K. Ka...
TCIAIG
2016
10 years 18 days ago
Predicting Dominance Rankings for Score-Based Games
—Game competitions may involve different player roles and be score-based rather than win/loss based. This raises the issue of how best to draw opponents for matches in ongoing co...
Spyridon Samothrakis, Diego Perez Liebana, Simon M...
TCIAIG
2016
10 years 18 days ago
Predicting Opponent's Production in Real-Time Strategy Games With Answer Set Programming
—The adversarial character of real-time strategy (RTS) games is one of the main sources of uncertainty within this domain. Since players lack exact knowledge about their opponent...
Marius Stanescu, Michal Certický
TCIAIG
2016
10 years 18 days ago
Online Adaptable Learning Rates for the Game Connect-4
—Learning board games by self-play has a long tradition in computational intelligence for games. Based on Tesauro’s seminal success with TD-Gammon in 1994, many successful agen...
Samineh Bagheri, Markus Thill, Patrick Koch, Wolfg...
TCIAIG
2016
10 years 18 days ago
How to Run a Successful Game-Based AI Competition
— Game-based competitions are commonly used within the Computational Intelligence (CI) and Artificial Intelligence (AI) in games community to benchmark algorithms and to attract...
Julian Togelius
TCCI
2016
10 years 18 days ago
Searching Web 2.0 Data Through Entity-Based Aggregation
Abstract. Entity-based searching has been introduced as a way of allowing users and applications to retrieve information about a specific real world object such as a person, an ev...
Ekaterini Ioannou, Yannis Velegrakis
TCC
2016
Springer
41views Cryptology» more  TCC 2016»
10 years 18 days ago
Two-Round Man-in-the-Middle Security from LPN
Secret-key authentication protocols have recently received a considerable amount of attention, and a long line of research has been devoted to devising efficient protocols with sec...
David Cash, Eike Kiltz, Stefano Tessaro
TCC
2016
Springer
50views Cryptology» more  TCC 2016»
10 years 18 days ago
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
About three decades ago it was realized that implementing private channels between parties which can be adaptively corrupted requires an encryption scheme that is secure against s...
Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzyszt...