Sciweavers

AAAI
2007
14 years 16 hour ago
An Implementation of Robot Formations using Local Interactions
Coordinating a group of robots to work in formation has been suggested for a number of tasks, such as urban searchand-rescue, traffic control, and harvesting solar energy. Algorit...
Ross Mead, Jerry B. Weinberg, Jeffrey R. Croxell
AAAI
2007
14 years 16 hour ago
Thresholded Rewards: Acting Optimally in Timed, Zero-Sum Games
In timed, zero-sum games, the goal is to maximize the probability of winning, which is not necessarily the same as maximizing our expected reward. We consider cumulative intermedi...
Colin McMillen, Manuela M. Veloso
AAAI
2007
14 years 16 hour ago
Cautious Inference in Collective Classification
Collective classification can significantly improve accuracy by exploiting relationships among instances. Although several collective inference procedures have been reported, they...
Luke McDowell, Kalyan Moy Gupta, David W. Aha
AAAI
2008
14 years 16 hour ago
User Identification by Means of Sketched Stroke Features
We present preliminary results of using physical features of a user's sketching style, such as pen tilt and pressure, to identify a user from their sketched strokes.
Brian Eoff, Tracy Hammond
AAAI
2007
14 years 16 hour ago
Hybrid Inference for Sensor Network Localization Using a Mobile Robot
In this paper, we consider a hybrid solution to the sensor network position inference problem, which combines a real-time filtering system with information from a more expensive,...
Dimitri Marinakis, David Meger, Ioannis M. Rekleit...
AAAI
2008
14 years 16 hour ago
Prediction and Change Detection in Sequential Data for Interactive Applications
We consider the problems of sequential prediction and change detection that arise often in interactive applications: A semi-automatic predictor is applied to a time-series and is ...
Jun Zhou, Li Cheng, Walter F. Bischof
AAAI
2007
14 years 16 hour ago
Graph Partitioning Based on Link Distributions
Existing graph partitioning approaches are mainly based on optimizing edge cuts and do not take the distribution of edge weights (link distribution) into consideration. In this pa...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
AAAI
2008
14 years 16 hour ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
AAAI
2007
14 years 16 hour ago
The Semantics of Variables in Action Descriptions
Action description language C+ is more expressive than ADL in many ways; for instance, it addresses the ramification problem. On the other hand, ADL is based on first-order logi...
Vladimir Lifschitz, Wanwan Ren
AAAI
2008
14 years 16 hour ago
Efficient Querying Relaxed Dominant Relationship between Product Items Based on Rank Aggregation
Current search engines cannot effectively rank those relational data, which exists on dynamic websites supported by online databases. In this study, to rank such structured data, ...
Zhenglu Yang, Lin Li, Masaru Kitsuregawa