Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
Conventional conversational recommender systems support interaction strategies that are hard-coded into the system in advance. In this context, Reinforcement Learning techniques h...
Project-centred learning is increasingly used both in academia and in companies; universities train students to master complex tasks, often suggested by real-life situations, while...
The Self-Organising Map is a popular unsupervised neural network model which has been used successfully in various contexts for clustering data. Even though labelled data is not re...
Abstract— In robot-assisted interventions, providing a surgeon with haptic information regarding contacts made between surgical instruments and tissue can improve task performanc...
Mahdi Tavakoli, Rajnikant V. Patel, Mehrdad Moalle...