Sciweavers

1176 search results - page 197 / 236
» Exploiting Online Games
Sort
View
NIPS
1994
13 years 10 months ago
Reinforcement Learning with Soft State Aggregation
It is widely accepted that the use of more compact representations than lookup tables is crucial to scaling reinforcement learning (RL) algorithms to real-world problems. Unfortun...
Satinder P. Singh, Tommi Jaakkola, Michael I. Jord...
AAMAS
2007
Springer
13 years 8 months ago
An experts approach to strategy selection in multiagent meeting scheduling
Abstract. In the multiagent meeting scheduling problem, agents negotiate with each other on behalf of their users to schedule meetings. While a number of negotiation approaches hav...
Elisabeth Crawford, Manuela M. Veloso
CGF
2008
129views more  CGF 2008»
13 years 8 months ago
Sequential Monte Carlo Adaptation in Low-Anisotropy Participating Media
This paper presents a novel method that effectively combines both control variates and importance sampling in a sequential Monte Carlo context. The radiance estimates computed dur...
Vincent Pegoraro, Ingo Wald, Steven G. Parker
ENTCS
2006
112views more  ENTCS 2006»
13 years 8 months ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
IJMMS
2008
131views more  IJMMS 2008»
13 years 8 months ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...