Warning: file_put_contents(cache/omni_e9396e837deb4d18b1dfbb0ee96b0050.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →Information-Sharing over Adaptive Networks with Self-interested Agents
We examine the behavior of multi-agent networks where information-sharing is subject to a positive communications cost over the edges linking the agents. We consider a general mean-square-error formul...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Controllability to Equilibria of the 1-D Fokker-Planck Equation with Zero-Flux Boundary Condition
We consider the problem of controlling the spatiotemporal probability distribution of a robotic swarm that evolves according to a reflected diffusion process, using the space- and time-dependent drift...
View Book →Continuous Time Gathering of Agents with Limited Visibility and Bearing-Only Sensing
A group of mobile agents, identical, anonymous, and oblivious (memoryless), having the capability to sense only the relative direction (bearing) to neighborhing agents within a finite visibility range...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Evaluation of Zika Vector Control Strategies Using Agent-Based Modeling
Aedes Aegypti is the vector of several deadly diseases, including Zika. Effective and sustainable vector control measures must be deployed to keep A. aegypti numbers under control. The distribution of...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →DTIC ADA624155: Designing Robust and Resilient Tactical MANETs
The overall research theme of this MURI, is the design and operation of reliable and secure tactical MANET. The emphasis of this research is the discovery and development of methods and algorithms tha...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
DTIC ADA618490: Simulation Screening Experiments Using Lasso-optimal Supersaturated Design and Analy
Screening methods are beneficial for studies involving simulations that have a large number of variables where a relatively small (but unknown) subset is important. In this paper, we show how a newly ...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
IEEE Southeastcon '99 : proceedings : technology on the brink of 2000 ... : March 25-28, 1999, Hyatt
xiii, 341 pages : 28 cm...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Algorithms for Decision Making
...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
DTIC ADA563243: A Real-time Strategy Agent Framework and Strategy Classifier for Computer Generated
This research effort is concerned with the advancement of computer generated forces AI for Department of Defense (DoD) military training and education. The vision of this work is agents capable of per...
View Book →
Foundations of Machine Learning
...
View Book →
Anisotropy Across Fields and Scales
...
View Book →Sharing Information Without Regret in Managed Stochastic Games
This paper considers information sharing in a multi-player repeated game. Every round, each player observes a subset of components of a random vector and then takes a control action. The utility earne...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →Models of latent consensus
The paper studies the problem of achieving consensus in multi-agent systems in the case where the dependency digraph $\Gamma$ has no spanning in-tree. We consider the regularization protocol that amou...
View Book →
DTIC ADA634036: Generalized Distributed Consensus-based Algorithms for Uncertain Systems and Network
We address four problems related to multi-agent optimization, filtering and agreement. First, we investigate collaborative optimization of an objective function expressed as a sum of local convex func...
View Book →DTIC ADA624523: Models of Conflict Expression
Conflict is a critical element of social interaction. More and more it is being mediated by technology such as email, SMS and online texting. Consequently, it is becoming increasingly important to dev...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →Decentralized Non-communicating Multiagent Collision Avoidance with Deep Reinforcement Learning
Finding feasible, collision-free paths for multiagent systems can be challenging, particularly in non-communicating scenarios where each agent's intent (e.g. goal) is unobservable to the others. In pa...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →Coordinate-Descent Diffusion Learning by Networked Agents
This work examines the mean-square error performance of diffusion stochastic algorithms under a generalized coordinate-descent scheme. In this setting, the adaptation step by each agent is limited to ...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →The robustness of democratic consensus
In linear models of consensus dynamics, the state of the various agents converges to a value which is a convex combination of the agents' initial states. We call it democratic if in the large scale li...
View Book →
Artificial intelligence
First published in 1994...
View Book →DTIC ADA502678: The Trust-based Interactive Partially Observable Markov Decision Process
Cooperative agent systems are designed so that each is working toward the same common good. The problem is that software systems are complex and can be subverted by an adversary to either break the sy...
View Book →
DTIC ADA619082: The Intersection of Robust Intelligence and Trust: Hybrid Teams, Firms, and Systems
We are developing the physics of interdependent uncertainty relations to efficiently and effectively control interdependence in autonomous hybrid teams (i.e., arbitrary combinations of humans, robots ...
View Book →
DTIC ADA554891: Trust, Opinion Diffusion and Radicalization in Social Networks
Gossiping models have increasingly been applied to study social network phenomena. This paper is specifically concerned with modeling how the opinions of social agents can be radicalized if the agents...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →Computing the nucleolus of weighted voting games
Weighted voting games (WVG) are coalitional games in which an agent's contribution to a coalition is given by his it weight, and a coalition wins if its total weight meets or exceeds a given quota. Th...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
A Control Dichotomy for Pure Scoring Rules
Scoring systems are an extremely important class of election systems. A length-$m$ (so-called) scoring vector applies only to $m$-candidate elections. To handle general elections, one must use a famil...
View Book →