We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 210 results
  1. On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC

    Rational multiparty computation (rational MPC) provides a framework for analyzing MPC protocols through the lens of game theory. One way to judge...
    Johannes Blömer, Jan Bobolz, Henrik Bröcher in Theory of Cryptography
    Conference paper 2023
  2. Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost

    Repeated coopetitive games capture the situation when one must efficiently balance between cooperation and competition with the other agents over...
    Shivakumar Mahesh, Nicholas Bishop, ... Long Tran-Thanh in Decision and Game Theory for Security
    Conference paper 2023
  3. An EEG-based subject-independent emotion recognition model using a differential-evolution-based feature selection algorithm

    Electroencephalogram (EEG)-based emotion recognition models are gaining interest as they show the intrinsic state of human. A wide range of features...

    K. Kannadasan, Sridevi Veerasingam, ... N. Ramasubramanian in Knowledge and Information Systems
    Article 30 September 2022
  4. Safe Pareto improvements for delegated game playing

    A set of players delegate playing a game to a set of representatives, one for each player. We imagine that each player trusts their respective...

    Caspar Oesterheld, Vincent Conitzer in Autonomous Agents and Multi-Agent Systems
    Article Open access 13 August 2022
  5. Event-triggered multi-agent credit allocation pursuit-evasion algorithm

    The reinforcement learning is used to study the problem of multi-agent pursuit-evasion games in this article. The main problem of current...

    Bo-Kun Zhang, Bin Hu, ... **n-Ming Cheng in Neural Processing Letters
    Article 05 October 2022
  6. Evolutionary Successful Strategies in a Transparent iterated Prisoner’s Dilemma

    A Transparent game is a game-theoretic setting that takes action visibility into account. In each round, depending on the relative timing of their...
    Anton M. Unakafov, Thomas Schultze, ... Fred Wolf in Applications of Evolutionary Computation
    Conference paper 2019
  7. Sorting

    Sorting a sequence of n elements probably is the most fascinating topic in computer science, and improved sorting implementations have significant...
    Stefan Edelkamp in Algorithmic Intelligence
    Chapter 2023
  8. An improved master-apprentice evolutionary algorithm for minimum independent dominating set problem

    The minimum independent dominance set (MIDS) problem is an important version of the dominating set with some other applications. In this work, we...

    Shiwei Pan, Yiming Ma, ... Shuli Hu in Frontiers of Computer Science
    Article 12 December 2022
  9. An empirical characterization of community structures in complex networks using a bivariate map of quality metrics

    Community detection emerges as an important task in the discovery of network mesoscopic structures. However, the concept of a “good” community is...

    Vinh-Loc Dao, Cécile Bothorel, Philippe Lenca in Social Network Analysis and Mining
    Article 10 April 2021
  10. Towards Constructing a Suite of Multi-objective Optimization Problems with Diverse Landscapes

    Given that real-world multi-objective optimization problems are generally constructed by combining individual functions to be optimized, it seems...
    Andrejaana Andova, Tobias Benecke, ... Tea Tušar in Applications of Evolutionary Computation
    Conference paper 2023
  11. A model-based many-objective evolutionary algorithm with multiple reference vectors

    In order to estimate the Pareto front, most of the existing evolutionary algorithms apply the discovery of non-dominated solutions in search space,...

    Pezhman Gholamnezhad, Ali Broumandnia, Vahid Seydi in Progress in Artificial Intelligence
    Article 10 June 2022
  12. A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach

    Heterogeneous cloud datacenters are well-suited and cost-efficient platforms for execution of scientific workflows requested from academics. Workflow...

    Yeganeh Asghari Alaie, Mirsaeid Hosseini Shirvani, Amir Masoud Rahmani in The Journal of Supercomputing
    Article 26 July 2022
  13. An Efficient Hybrid Mine Blast Algorithm for Tackling Software Fault Prediction Problem

    An inherent problem in software engineering is that competing prediction systems have been found to produce conflicting results. Yet accurate...

    Mohammed Alweshah, Sofian Kassaymeh, ... Ibrahim Altarawni in Neural Processing Letters
    Article 25 July 2023
  14. Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing

    With the development of collaborative edge computing (CEC), the manufacturing market is gradually moving toward large-scale, multi-scenario, and...

    Chengfeng Jian, Zhuoyang Pan, ... Meiyu Zhang in Cluster Computing
    Article 30 January 2023
  15. Analysing Multiobjective Optimization Using Evolutionary Path Length Correlation

    Recently, a number of studies have attempted to characterize the interaction between objectives and decision variables in multiobjective problems. In...
    Daniel Herring, Dean Pakravan, Michael Kirley in AI 2021: Advances in Artificial Intelligence
    Conference paper 2022
  16. Wrapper-based optimized feature selection using nature-inspired algorithms

    Computations that mimic nature are known as nature-inspired computing. Nature presents a wealthy source of thoughts and ideas for computing. The use...

    Namrata Karlupia, Pawanesh Abrol in Neural Computing and Applications
    Article 06 March 2023
  17. Towards a Theory of Valid Inferential Models with Partial Prior Information

    Inferential models (IMs) are used to quantify uncertainty in statistical inference problems, and validity is a crucial property that ensures the IM’s...
    Conference paper 2021
  18. What do we really know about the drivers of undeclared work? An evaluation of the current state of affairs using machine learning

    It is nowadays widely understood that undeclared work cannot be efficiently combated without a holistic view on the mechanisms underlying its...

    Josip Franic in AI & SOCIETY
    Article 23 June 2022
  19. An integrated approach using IF-TOPSIS, fuzzy DEMATEL, and enhanced CSA optimized ANFIS for software risk prediction

    Successful project is determined based on its effective performance and prioritization of all unavoidable software project risks. In this paper, the...

    K. Suresh, R. Dillibabu in Knowledge and Information Systems
    Article 28 May 2021
  20. Learning Beam Search: Utilizing Machine Learning to Guide Beam Search for Solving Combinatorial Optimization Problems

    Beam search (BS) is a well-known incomplete breadth-first-search variant frequently used to find heuristic solutions to hard combinatorial...
    Marc Huber, Günther R. Raidl in Machine Learning, Optimization, and Data Science
    Conference paper 2022
Did you find what you were looking for? Share feedback.