Search
Skip to Search Results- 101Machine learning
- 21Game theory
- 10Artificial intelligence
- 7Poker
- 5Reinforcement learning
- 4Regret minimization
- 4Hindle, Abram
- 4Mark A. Lewis
- 4Russell Greiner
- 3Johanson, Michael
- 3Noonari, Juned (Supervisor)
- 3Pouria Ramazi
- 88Graduate and Postdoctoral Studies (GPS), Faculty of
- 88Graduate and Postdoctoral Studies (GPS), Faculty of/Theses and Dissertations
- 8Computing Science, Department of
- 7Master of Science in Internetworking (MINT)
- 7Master of Science in Internetworking (MINT)/Capstone Projects & Reports (Master of Science in Internetworking (MINT))
- 6Biological Sciences, Department of
-
2013
In the field of computational game theory, games are often compared in terms of their size. This can be measured in several ways, including the number of unique game states, the number of decision points, and the total number of legal actions over all decision points. These numbers are either...
-
2013-02-26
In the field of computational game theory, games are often compared in terms of their size. This can be measured in several ways, including the number of unique game states, the number of decision points, and the total number of legal actions over all decision points. These numbers are either...
-
2021-01-01
Arezoo Haratian, Hadi Fazelinia, Zeinab Maleki, Pouria Ramazi, Hao Wang, Mark A. Lewis, Russell Greiner, David Wishart
This dataset provides information related to the outbreak of COVID-19 disease in the United States, including data from each of 3142 US counties from the beginning of the outbreak (January 2020) until June 2021. This data is collected from many public online databases and includes the...
-
2018
Chowdhury, S., Borle, S., Romansky, S., Hindle, Abram
Software energy consumption is a performance related non-functional requirement that complicates building software on mobile devices today. Energy hogging applications (apps) are a liability to both the end-user and software developer. Measuring software energy consumption is non-trivial,...
-
2021-09-01
All elements of the IT industry are expanding, including bandwidth, storage, processing speed. As a result, there are now more cyber threats and attacks, necessitating a creative and predictive security approach that employs cutting-edge technology to combat the danger. The trends will be...
-
2021-10-12
This project presents a website which is also a web application for data visualization and machine learning. This project contains three parts which are front-end website development (mainly focusing on HTML5, CSS3, bootstrap and JavaScript), back-end server (mainly working with database and...
-
Research on IoT Threats & Implementation of AI/ML to Address Emerging Cybersecurity Issues in IoT with Cloud Computing
Download2022-03-31
Internet of Things (IoT) has become one of the progressive innovations and inviting space of interest for the research world and financially captivating for the business world. Integrating different devices and associating devices with humans requires artificial intelligence/ machine learning...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...
-
What can Android mobile app developers do about the energy consumption of machine learning?
Download2018
McIntosh, A., Hassan, S., Hindle, Abram
Machine learning is a popular method of learning functions from data to represent and to classify sensor inputs, multimedia, emails, and calendar events. Smartphone applications have been integrating more and more intelligence in the form of machine learning. Machine learning functionality now...