This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
An integrated medium access control framework for a direct sequence code-division multiple access (CDMA) radio access to an asynchronous transfer mode (ATM) network is considered. ...
Several different controller representations are compared on a non-trivial problem in simulated car racing, with respect to learning speed and final fitness. The controller rep...
Alexandros Agapitos, Julian Togelius, Simon M. Luc...
We present a biologically inspired neural network model of visual orienting (using saccadic eye movements) in which targets are preferentially selected according to their reward va...