Your selections:
A nethack learning environment language wrapper for autonomous agents
- Goodger, Nikolaj, Vamplew, Peter, Foale, Cameron, Dazeley, Richard
Evolved similarity techniques in malware analysis
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Patient admission prediction using a pruned fuzzy min-max neural network with rule extraction
- Wang, Jin, Lim, Cheepeng, Creighton, Douglas, Khorsavi, Abbas, Nahavandi, Saeid, Ugon, Julien, Vamplew, Peter, Stranieri, Andrew, Martin, Laura, Freischmidt, Anton
Detecting K-complexes for sleep stage identification using nonsmooth optimization
- Moloney, David, Sukhorukova, Nadezda, Vamplew, Peter, Ugon, Julien, Li, Gang, Beliakov, Gleb, Philippe, Carole, Amiel, Hélène, Ugon, Adrien
Optimization and matrix constructions for classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter, Abawajy, Jemal, Chowdhury, Morshed
An online scalarization multi-objective reinforcement learning algorithm : TOPSIS Q-learning
- Mirzanejad, Mohammad, Ebrahimi, Morteza, Vamplew, Peter, Veisi, Hadi
Using stereotypes to improve early-match poker play
- Layton, Robert, Vamplew, Peter, Turville, Christopher
Rapid anomaly detection using integrated prudence analysis (IPA)
- Maruatona, Omaru, Vamplew, Peter, Dazeley, Richard, Watters, Paul
Taming the devil: a game based approach to teaching immunology
- Nankervis, Scott, Meredith, Grant, Vamplew, Peter, Fotinatos, Nina
Unsupervised color textured image segmentation using cluster ensembles and MRF mdel
- Islam, Mofakharul, Yearwood, John, Vamplew, Peter
A polynomial ring construction for the classification of data
- Kelarev, Andrei, Yearwood, John, Vamplew, Peter
Constructing stochastic mixture policies for episodic multiobjective reinforcement learning tasks
- Vamplew, Peter, Dazeley, Richard, Barker, Ewan, Kelarev, Andrei
Levels of explainable artificial intelligence for human-aligned conversational explanations
- Dazeley, Richard, Vamplew, Peter, Foale, Cameron, Young, Cameron, Aryal, Sunil, Cruz, Francisco
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Reanimating historic malware samples
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Applying clustering and ensemble clustering approaches to phishing profiling
- Webb, Dean, Yearwood, John, Vamplew, Peter, Ma, Liping, Ofoghi, Bahadorreza, Kelarev, Andrei
Softmax exploration strategies for multiobjective reinforcement learning
- Vamplew, Peter, Dazeley, Richard, Foale, Cameron
Visualising the value of water
- Block, Jessica, Graymore, Michelle, Wallis, Anne, Vamplew, Peter, Mitchell, Bradley, O'Toole, Kevin, McRae-Williams, Pamela
Griefers versus the Griefed - what motivates them to play Massively Multiplayer Online Role-Playing Games?
- Achterbosch, Leigh, Miller, Charlynn, Turville, Christopher, Vamplew, Peter
Identifying cross-version function similarity using contextual features
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Are you sure you would like to clear your session, including search history and login status?