194 results on '"A. Balduzzi"'
Search Results
2. An Empirical Evaluation of CNC Machines in Industry 4.0 (Short Paper).
3. D3C: Reducing the Price of Anarchy in Multi-Agent Learning.
4. Machine-Learning Accelerated Studies of Materials with High Performance and Edge Computing.
5. A Limited-Capacity Minimax Theorem for Non-Convex Games or: How I Learned to Stop Worrying about Mixed-Nash and Love Neural Nets.
6. From Poincaré Recurrence to Convergence in Imperfect Information Games: Finding Equilibrium via Regularization.
7. Smart Factory Security: A Case Study on a Modular Smart Manufacturing System.
8. Learning to Resolve Alliance Dilemmas in Many-Player Zero-Sum Games.
9. Detecting Insecure Code Patterns in Industrial Robot Programs.
10. From Chaos to Order: Symmetry and Conservation Laws in Game Dynamics.
11. Pick Your Battles: Interaction Graphs as Population-Level Objectives for Strategic Diversity.
12. Robust Self-organization in Games: Symmetries, Conservation Laws and Dimensionality Reduction.
13. Accelerating DCA++ (Dynamical Cluster Approximation) Scientific Application on the Summit Supercomputer.
14. A Security Evaluation of Industrial Radio Remote Controllers.
15. Open-ended learning in symmetric zero-sum games.
16. Smooth markets: A basic mechanism for organizing gradient-based learners.
17. Real World Games Look Like Spinning Tops.
18. Re-evaluating evaluation.
19. Investigating Web Defacement Campaigns at Large.
20. The Mechanics of n-Player Differentiable Games.
21. Back To RGB: Deep articulated hand pose estimation from a single camera image.
22. Exploring the Long Tail of (Malicious) Software Downloads.
23. Strongly-Typed Agents are Guaranteed to Interact Safely.
24. Neural Taylor Approximations: Convergence and Exploration in Rectifier Networks.
25. The Shattered Gradients Problem: If resnets are the answer, then what is the question?
26. Attacks landscape in the dark side of the web.
27. Stable Opponent Shaping in Differentiable Games.
28. A Computationally Efficient Method for the Thermo-Structural Analysis of a Turbocharger Turbine Wheel Under Engine Transient Operation
29. A Critical Analysis on the Impact of External Losses on the Performance of a Centrifugal Compressor Stage – Experimental and Multi-Fidelity Numerical Assessment
30. Automatic Extraction of Indicators of Compromise for Web Applications.
31. Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining.
32. MobiPot: Understanding Mobile Telephony Threats with Honeycards.
33. Deep Reconstruction-Classification Networks for Unsupervised Domain Adaptation.
34. Strongly-Typed Recurrent Neural Networks.
35. Domain Generalization for Object Recognition with Multi-task Autoencoders.
36. Learning the Structure of Sum-Product Networks via an SVD-based Algorithm.
37. Kickback Cuts Backprop's Red-Tape: Biologically Plausible Credit Assignment in Neural Networks.
38. Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
39. A security evaluation of AIS automated identification system.
40. Cortical prediction markets.
41. An experimental and numerical investigation on the impact of tip gap on the performance of vaned diffuser for industrial centrifugal compressors
42. The role of phone numbers in understanding cyber-crime schemes.
43. Targeted attacks detection with SPuNge.
44. Correlated random features for fast semi-supervised learning.
45. What Epipolar Geometry Can Do for Video-Surveillance.
46. Domain Generalization via Invariant Feature Representation.
47. Towards a learning-theoretic analysis of spike-timing dependent plasticity.
48. A Nonparametric Conjugate Prior Distribution for the Maximizing Argument of a Noisy Function.
49. A security analysis of amazon's elastic compute cloud service.
50. Detecting emergent processes in cellular automata with excess information.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.