Abstract— Currently, most of the automated, computervision assisted camera control policies are based on human events, such as the speaker gesture and position changes. In additi...
—Multi-agent systems are difficult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Many algorithms such as Q-learning successfully address reinforcement learning in single-agent multi-time-step problems. In addition there are methods that address reinforcement l...
Several recently proposed infrastructures permit client applications to interact with distributed network-accessible services by simply ”plugging in” into a substrate that pro...
Anca-Andreea Ivan, Josh Harman, Michael Allen, Vij...
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...