Often, the only sources of information about the evolution of software systems are the systems themselves and their histories. Version control repositories contain information on ...
—This work investigates a central problem in steganography, that is: How much data can safely be hidden without being detected? To answer this question a formal definition of st...
The AAAI Mobile Robot Challenge requires robots to start from the entrance of the conference site, find their own way to the registration desk, socially interact with people and p...
This paper introduces a principled approach for the design of a scalable general reinforcement learning agent. This approach is based on a direct approximation of AIXI, a Bayesian...
Joel Veness, Kee Siong Ng, Marcus Hutter, David Si...
This paper investigates the foundation of rnaxipnin, one of the central qualitative decision criteria, using the approach taken by Savage (Savage 1972) to investigate the foundati...