Sciweavers

84 search results - page 9 / 17
» Finding and transferring policies using stored behaviors
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 8 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
AAAI
2008
13 years 9 months ago
Planning for Human-Robot Interaction Using Time-State Aggregated POMDPs
In order to interact successfully in social situations, a robot must be able to observe others' actions and base its own behavior on its beliefs about their intentions. Many ...
Frank Broz, Illah R. Nourbakhsh, Reid G. Simmons
IJAIT
2008
146views more  IJAIT 2008»
13 years 7 months ago
Learning to Behave in Space: a Qualitative Spatial Representation for Robot Navigation with Reinforcement Learning
ion mechanism to create a representation of space consisting of the circular order of detected landmarks and the relative position of walls towards the agent's moving directio...
Lutz Frommberger
TMC
2012
11 years 10 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...