Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
We use reinforcement learning (RL) to compute strategies for multiagent soccer teams. RL may pro t signi cantly from world models (WMs) estimating state transition probabilities an...
Pulitzer Prize-winning journalist Nicholas Kristof argues that “in this century the paramount moral challenge will be the struggle for gender equality around the world.” In th...
In this study, we examine human social interactions within virtual worlds and address the question of how group interactions are affected by the surrounding game environment. To i...
Visualisations implemented as virtual worlds can allow users to comprehend large graphs more effectively. Good 3D layout algorithms are an important element. Angle has been develo...