Author of the publication

Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search.

, , , and . SOCS, page 156-160. AAAI Press, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case., , , and . EuroS&P Workshops, page 99-103. IEEE, (2017)Deployment of DNIDS in Social Networks., , and . ISI, page 59-65. IEEE, (2007)Simulating Threats Propagation within the NSP Infrastructure., , , and . ISI, page 380. IEEE, (2007)Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , and . CoRR, (2017)Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback., , and . CoRR, (2020)Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic., , , and . SBP-BRiMS, volume 9708 of Lecture Notes in Computer Science, page 239-249. Springer, (2016)Analysis of Attack Graph Representations for Ranking Vulnerability Fixes., , , , and . GCAI, volume 55 of EPiC Series in Computing, page 215-228. EasyChair, (2018)Solving the Snake in the Box Problem with Heuristic Search: First Results., , , , , and . SOCS, page 96-104. AAAI Press, (2015)Confidence Backup Updates for Aggregating MDP State Values in Monte-Carlo Tree Search., , , and . SOCS, page 156-160. AAAI Press, (2015)Extended Framework for Target Oriented Network Intelligence Collection., , , and . SOCS, page 131-138. AAAI Press, (2014)