Sciweavers

AAECC
2015
Springer
7views Algorithms» more  AAECC 2015»
10 years 1 months ago
The Rabin cryptosystem revisited
The Rabin scheme used in public-key cryptosystem is here revisited with a focus limited to a few specific open issues. In particular, message decryption requires one out of four ...
Michele Elia, Matteo Piva, Davide Schipani
AAAI
2015
10 years 1 months ago
Optimizing the CVaR via Sampling
Conditional Value at Risk (CVaR) is a prominent risk measure that is being used extensively in various domains. We develop a new formula for the gradient of the CVaR in the form o...
Aviv Tamar, Yonatan Glassner, Shie Mannor
AAAI
2015
10 years 1 months ago
Loss-Calibrated Monte Carlo Action Selection
Bayesian decision-theory underpins robust decisionmaking in applications ranging from plant control to robotics where hedging action selection against state uncertainty is critica...
Ehsan Abbasnejad, Justin Domke, Scott Sanner
AAAI
2015
10 years 1 months ago
Steering Evolution Strategically: Computational Game Theory and Opponent Exploitation for Treatment Planning, Drug Design, and S
Living organisms adapt to challenges through evolution and adaptation. This has proven to be a key difficulty in developing therapies, since the organisms develop resistance. I p...
Tuomas Sandholm
AAAI
2015
10 years 1 months ago
Real-Time Symbolic Dynamic Programming
Recent advances in Symbolic Dynamic Programming (SDP) combined with the extended algebraic decision diagram (XADD) have provided exact solutions for expressive subclasses of fini...
Luis Gustavo Rocha Vianna, Leliane N. de Barros, S...
AAAI
2015
10 years 1 months ago
Robust Subspace Clustering via Thresholding Ridge Regression
Given a data set from a union of multiple linear subspaces, a robust subspace clustering algorithm fits each group of data points with a low-dimensional subspace and then cluster...
Xi Peng 0001, Zhang Yi 0001, Huajin Tang
AAAI
2015
10 years 1 months ago
HACKAR: Helpful Advice for Code Knowledge and Attack Resilience
This paper describes a novel combination of Java program analysis and automated learning and planning architecture to the domain of Java vulnerability analysis. The key feature of...
Ugur Kuter, Mark H. Burstein, J. Benton, Daniel Br...
AAAI
2015
10 years 1 months ago
Mining User Consumption Intention from Social Media Using Domain Adaptive Convolutional Neural Network
Social media platforms are often used by people to express their needs and desires. Such data offer great opportunities to identify users’ consumption intention from user-genera...
Xiao Ding, Ting Liu, Junwen Duan, Jian-Yun Nie
AAAI
2015
10 years 1 months ago
Going Beyond Literal Command-Based Instructions: Extending Robotic Natural Language Interaction Capabilities
The ultimate goal of human natural language interaction is to communicate intentions. However, these intentions are often not directly derivable from the semantics of an utterance...
Tom Williams, Gordon Briggs, Bradley Oosterveld, M...