callback( { "result":{ "query":":facetid:toc:\"db/conf/aaai/aaai2013.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"218.15" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"252", "@dc":"252", "@oc":"252", "@id":"43272347", "text":":facetid:toc:db/conf/aaai/aaai2013.bht" } }, "hits":{ "@total":"252", "@computed":"252", "@sent":"252", "@first":"0", "hit":[{ "@score":"1", "@id":"4071747", "info":{"authors":{"author":[{"@pid":"93/96-1","text":"Chang Wang 0001"},{"@pid":"97/3847","text":"Sridhar Mahadevan"}]},"title":"Multiscale Manifold Learning.","venue":"AAAI","pages":"912-918","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/0001M13","doi":"10.1609/AAAI.V27I1.8633","ee":"https://doi.org/10.1609/aaai.v27i1.8633","url":"https://dblp.org/rec/conf/aaai/0001M13"}, "url":"URL#4071747" }, { "@score":"1", "@id":"4071748", "info":{"authors":{"author":[{"@pid":"73/8044","text":"Abhijin Adiga"},{"@pid":"09/7561","text":"Chris J. Kuhlman"},{"@pid":"15/3599","text":"Henning S. Mortveit"},{"@pid":"89/7912","text":"Anil Kumar S. Vullikanti"}]},"title":"Sensitivity of Diffusion Dynamics to Network Uncertainty.","venue":"AAAI","pages":"2-8","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AdigaKMV13","doi":"10.1609/AAAI.V27I1.8686","ee":"https://doi.org/10.1609/aaai.v27i1.8686","url":"https://dblp.org/rec/conf/aaai/AdigaKMV13"}, "url":"URL#4071748" }, { "@score":"1", "@id":"4071749", "info":{"authors":{"author":[{"@pid":"82/4968","text":"Aaron Adler"},{"@pid":"38/3765","text":"Fusun Yaman"},{"@pid":"42/1953","text":"Jacob Beal"},{"@pid":"26/9930","text":"Jeffrey Cleveland"},{"@pid":"69/6803","text":"Hala Mostafa"},{"@pid":"08/7748","text":"Annan Mozeika"}]},"title":"A Morphogenetically Assisted Design Variation Tool.","venue":"AAAI","pages":"9-15","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AdlerYBCMM13","doi":"10.1609/AAAI.V27I1.8654","ee":"https://doi.org/10.1609/aaai.v27i1.8654","url":"https://dblp.org/rec/conf/aaai/AdlerYBCMM13"}, "url":"URL#4071749" }, { "@score":"1", "@id":"4071751", "info":{"authors":{"author":[{"@pid":"94/5256","text":"Sandip Aine"},{"@pid":"33/1426","text":"Maxim Likhachev"}]},"title":"Truncated Incremental Search: Faster Replanning by Exploiting Suboptimality.","venue":"AAAI","pages":"16-24","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AineL13","doi":"10.1609/AAAI.V27I1.8673","ee":"https://doi.org/10.1609/aaai.v27i1.8673","url":"https://dblp.org/rec/conf/aaai/AineL13"}, "url":"URL#4071751" }, { "@score":"1", "@id":"4071752", "info":{"authors":{"author":[{"@pid":"17/11285","text":"Charilaos Akasiadis"},{"@pid":"92/2998","text":"Georgios Chalkiadakis"}]},"title":"Agent Cooperatives for Effective Power Consumption Shifting.","venue":"AAAI","pages":"1263-1269","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AkasiadisC13","doi":"10.1609/AAAI.V27I1.8477","ee":"https://doi.org/10.1609/aaai.v27i1.8477","url":"https://dblp.org/rec/conf/aaai/AkasiadisC13"}, "url":"URL#4071752" }, { "@score":"1", "@id":"4071753", "info":{"authors":{"author":[{"@pid":"127/6400","text":"Muddasser Alam"},{"@pid":"37/4849","text":"Alex Rogers"},{"@pid":"81/1719","text":"Sarvapali D. Ramchurn"}]},"title":"Interdependent Multi-Issue Negotiation for Energy Exchange in Remote Communities.","venue":"AAAI","pages":"25-31","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AlamRR13","doi":"10.1609/AAAI.V27I1.8614","ee":"https://doi.org/10.1609/aaai.v27i1.8614","url":"https://dblp.org/rec/conf/aaai/AlamRR13"}, "url":"URL#4071753" }, { "@score":"1", "@id":"4071754", "info":{"authors":{"author":[{"@pid":"a/NatashaAlechina","text":"Natasha Alechina"},{"@pid":"66/2896","text":"Tristan M. Behrens"},{"@pid":"d/MehdiDastani","text":"Mehdi Dastani"},{"@pid":"67/2212","text":"Koen V. Hindriks"},{"@pid":"h/JomiFredHubner","text":"Jomi Fred Hübner"},{"@pid":"81/6813","text":"Brian Logan 0001"},{"@pid":"14/6741","text":"Hai H. Nguyen"},{"@pid":"133/1757","text":"Marc van Zee"}]},"title":"Multi-Cycle Query Caching in Agent Programming.","venue":"AAAI","pages":"32-38","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AlechinaBDHHLNZ13","doi":"10.1609/AAAI.V27I1.8618","ee":"https://doi.org/10.1609/aaai.v27i1.8618","url":"https://dblp.org/rec/conf/aaai/AlechinaBDHHLNZ13"}, "url":"URL#4071754" }, { "@score":"1", "@id":"4071755", "info":{"authors":{"author":[{"@pid":"a/NAlon","text":"Noga Alon"},{"@pid":"30/4741","text":"Dvir Falik"},{"@pid":"24/5865","text":"Reshef Meir"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"}]},"title":"Bundling Attacks in Judgment Aggregation.","venue":"AAAI","pages":"39-45","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AlonFMT13","doi":"10.1609/AAAI.V27I1.8611","ee":"https://doi.org/10.1609/aaai.v27i1.8611","url":"https://dblp.org/rec/conf/aaai/AlonFMT13"}, "url":"URL#4071755" }, { "@score":"1", "@id":"4071757", "info":{"authors":{"author":[{"@pid":"41/7403","text":"Hadi Amiri"},{"@pid":"23/1818","text":"Zheng-Jun Zha"},{"@pid":"24/6606","text":"Tat-Seng Chua"}]},"title":"A Pattern Matching Based Model for Implicit Opinion Question Identification.","venue":"AAAI","pages":"46-52","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AmiriZC13","doi":"10.1609/AAAI.V27I1.8604","ee":"https://doi.org/10.1609/aaai.v27i1.8604","url":"https://dblp.org/rec/conf/aaai/AmiriZC13"}, "url":"URL#4071757" }, { "@score":"1", "@id":"4071759", "info":{"authors":{"author":[{"@pid":"133/1857","text":"Garrett Andersen"},{"@pid":"c/VincentConitzer","text":"Vincent Conitzer"}]},"title":"Fast Equilibrium Computation for Infinitely Repeated Games.","venue":"AAAI","pages":"53-59","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AndersenC13","doi":"10.1609/AAAI.V27I1.8573","ee":"https://doi.org/10.1609/aaai.v27i1.8573","url":"https://dblp.org/rec/conf/aaai/AndersenC13"}, "url":"URL#4071759" }, { "@score":"1", "@id":"4071760", "info":{"authors":{"author":[{"@pid":"66/414","text":"Elliot Anshelevich"},{"@pid":"55/9578","text":"Meenal Chhabra"},{"@pid":"30/2277","text":"Sanmay Das"},{"@pid":"118/3979","text":"Matthew Gerrior"}]},"title":"On the Social Welfare of Mechanisms for Repeated Batch Matching.","venue":"AAAI","pages":"60-66","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AnshelevichCDG13","doi":"10.1609/AAAI.V27I1.8666","ee":"https://doi.org/10.1609/aaai.v27i1.8666","url":"https://dblp.org/rec/conf/aaai/AnshelevichCDG13"}, "url":"URL#4071760" }, { "@score":"1", "@id":"4071761", "info":{"authors":{"author":[{"@pid":"69/2126","text":"Itai Ashlagi"},{"@pid":"09/6191","text":"Brendan Lucier"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"}]},"title":"Equilibria of Online Scheduling Algorithms.","venue":"AAAI","pages":"67-73","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AshlagiLT13","doi":"10.1609/AAAI.V27I1.8631","ee":"https://doi.org/10.1609/aaai.v27i1.8631","url":"https://dblp.org/rec/conf/aaai/AshlagiLT13"}, "url":"URL#4071761" }, { "@score":"1", "@id":"4071763", "info":{"authors":{"author":[{"@pid":"18/9923","text":"Amos Azaria"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"}]},"title":"Advice Provision in Multiple Prospect Selection Problems.","venue":"AAAI","pages":"1605-1606","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AzariaK13","doi":"10.1609/AAAI.V27I1.8523","ee":"https://doi.org/10.1609/aaai.v27i1.8523","url":"https://dblp.org/rec/conf/aaai/AzariaK13"}, "url":"URL#4071763" }, { "@score":"1", "@id":"4071764", "info":{"authors":{"author":[{"@pid":"67/2967","text":"Haris Aziz 0001"},{"@pid":"33/5862","text":"Serge Gaspers"},{"@pid":"54/7115","text":"Nicholas Mattei"},{"@pid":"87/3366","text":"Nina Narodytska"},{"@pid":"86/2576","text":"Toby Walsh"}]},"title":"Ties Matter: Complexity of Manipulation when Tie-Breaking with a Random Vote.","venue":"AAAI","pages":"74-80","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/AzizGMNW13","doi":"10.1609/AAAI.V27I1.8701","ee":"https://doi.org/10.1609/aaai.v27i1.8701","url":"https://dblp.org/rec/conf/aaai/AzizGMNW13"}, "url":"URL#4071764" }, { "@score":"1", "@id":"4071766", "info":{"authors":{"author":[{"@pid":"70/2671","text":"Yoram Bachrach"},{"@pid":"94/248","text":"Pushmeet Kohli"},{"@pid":"89/3764","text":"Vladimir Kolmogorov"},{"@pid":"05/3431","text":"Morteza Zadimoghaddam"}]},"title":"Optimal Coalition Structure Generation in Cooperative Graph Games.","venue":"AAAI","pages":"81-87","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BachrachKKZ13","doi":"10.1609/AAAI.V27I1.8653","ee":"https://doi.org/10.1609/aaai.v27i1.8653","url":"https://dblp.org/rec/conf/aaai/BachrachKKZ13"}, "url":"URL#4071766" }, { "@score":"1", "@id":"4071767", "info":{"authors":{"author":{"@pid":"18/6694","text":"Bikramjit Banerjee"}},"title":"Pruning for Monte Carlo Distributed Reinforcement Learning in Decentralized POMDPs.","venue":"AAAI","pages":"88-94","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Banerjee13","doi":"10.1609/AAAI.V27I1.8670","ee":"https://doi.org/10.1609/aaai.v27i1.8670","url":"https://dblp.org/rec/conf/aaai/Banerjee13"}, "url":"URL#4071767" }, { "@score":"1", "@id":"4071769", "info":{"authors":{"author":[{"@pid":"85/9005","text":"Elias Bareinboim"},{"@pid":"p/JudeaPearl","text":"Judea Pearl"}]},"title":"Causal Transportability with Limited Experiments.","venue":"AAAI","pages":"95-101","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BareinboimP13","doi":"10.1609/AAAI.V27I1.8692","ee":"https://doi.org/10.1609/aaai.v27i1.8692","url":"https://dblp.org/rec/conf/aaai/BareinboimP13"}, "url":"URL#4071769" }, { "@score":"1", "@id":"4071770", "info":{"authors":{"author":[{"@pid":"39/2945","text":"Samuel Barrett"},{"@pid":"s/PeterStone","text":"Peter Stone"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"},{"@pid":"13/4267","text":"Avi Rosenfeld"}]},"title":"Teamwork with Limited Knowledge of Teammates.","venue":"AAAI","pages":"102-108","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BarrettSKR13","doi":"10.1609/AAAI.V27I1.8659","ee":"https://doi.org/10.1609/aaai.v27i1.8659","url":"https://dblp.org/rec/conf/aaai/BarrettSKR13"}, "url":"URL#4071770" }, { "@score":"1", "@id":"4071771", "info":{"authors":{"author":[{"@pid":"60/3977","text":"Sumit Basu"},{"@pid":"94/9013","text":"Janara Christensen"}]},"title":"Teaching Classification Boundaries to Humans.","venue":"AAAI","pages":"109-115","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BasuC13","doi":"10.1609/AAAI.V27I1.8623","ee":"https://doi.org/10.1609/aaai.v27i1.8623","url":"https://dblp.org/rec/conf/aaai/BasuC13"}, "url":"URL#4071771" }, { "@score":"1", "@id":"4071772", "info":{"authors":{"author":{"@pid":"83/6712","text":"Daniel Bauer"}},"title":"Understanding Descriptions of Visual Scenes Using Graph Grammars.","venue":"AAAI","pages":"1656-1657","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Bauer13","doi":"10.1609/AAAI.V27I1.8498","ee":"https://doi.org/10.1609/aaai.v27i1.8498","url":"https://dblp.org/rec/conf/aaai/Bauer13"}, "url":"URL#4071772" }, { "@score":"1", "@id":"4071777", "info":{"authors":{"author":[{"@pid":"133/1749","text":"Moshe Bitan"},{"@pid":"65/3114","text":"Ya'akov Gal"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"},{"@pid":"28/10826","text":"Elad Dokow"},{"@pid":"18/9923","text":"Amos Azaria"}]},"title":"Social Rankings in Human-Computer Committees.","venue":"AAAI","pages":"116-122","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BitanGKDA13","doi":"10.1609/AAAI.V27I1.8610","ee":"https://doi.org/10.1609/aaai.v27i1.8610","url":"https://dblp.org/rec/conf/aaai/BitanGKDA13"}, "url":"URL#4071777" }, { "@score":"1", "@id":"4071780", "info":{"authors":{"author":[{"@pid":"42/2103","text":"James C. Boerkoel Jr."},{"@pid":"d/EHDurfee","text":"Edmund H. Durfee"}]},"title":"Decoupling the Multiagent Disjunctive Temporal Problem.","venue":"AAAI","pages":"123-129","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BoerkoelD13","doi":"10.1609/AAAI.V27I1.8583","ee":"https://doi.org/10.1609/aaai.v27i1.8583","url":"https://dblp.org/rec/conf/aaai/BoerkoelD13"}, "url":"URL#4071780" }, { "@score":"1", "@id":"4071782", "info":{"authors":{"author":[{"@pid":"b/RonenIBrafman","text":"Ronen I. Brafman"},{"@pid":"77/5955","text":"Guy Shani"},{"@pid":"z/ShlomoZilberstein","text":"Shlomo Zilberstein"}]},"title":"Qualitative Planning under Partial Observability in Multi-Agent Domains.","venue":"AAAI","pages":"130-137","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BrafmanSZ13","doi":"10.1609/AAAI.V27I1.8643","ee":"https://doi.org/10.1609/aaai.v27i1.8643","url":"https://dblp.org/rec/conf/aaai/BrafmanSZ13"}, "url":"URL#4071782" }, { "@score":"1", "@id":"4071783", "info":{"authors":{"author":[{"@pid":"90/7113","text":"Simina Brânzei"},{"@pid":"c/IoannisCaragiannis","text":"Ioannis Caragiannis"},{"@pid":"64/8610","text":"Jamie Morgenstern"},{"@pid":"p/ArielDProcaccia","text":"Ariel D. Procaccia"}]},"title":"How Bad Is Selfish Voting?","venue":"AAAI","pages":"138-144","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BranzeiCMP13","doi":"10.1609/AAAI.V27I1.8667","ee":"https://doi.org/10.1609/aaai.v27i1.8667","url":"https://dblp.org/rec/conf/aaai/BranzeiCMP13"}, "url":"URL#4071783" }, { "@score":"1", "@id":"4071784", "info":{"authors":{"author":[{"@pid":"63/7554","text":"Ronan LeBras"},{"@pid":"30/5718","text":"Bistra Dilkina"},{"@pid":"117/4903","text":"Yexiang Xue"},{"@pid":"g/CarlaPGomes","text":"Carla P. Gomes"},{"@pid":"47/9922","text":"Kevin S. McKelvey"},{"@pid":"24/9922","text":"Michael K. Schwartz"},{"@pid":"36/9923","text":"Claire A. Montgomery"}]},"title":"Robust Network Design For Multispecies Conservation.","venue":"AAAI","pages":"1305-1312","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BrasDXGMSM13","doi":"10.1609/AAAI.V27I1.8491","ee":"https://doi.org/10.1609/aaai.v27i1.8491","url":"https://dblp.org/rec/conf/aaai/BrasDXGMSM13"}, "url":"URL#4071784" }, { "@score":"1", "@id":"4071785", "info":{"authors":{"author":[{"@pid":"01/9770","text":"Gordon Michael Briggs"},{"@pid":"00/2197","text":"Matthias Scheutz"}]},"title":"A Hybrid Architectural Approach to Understanding and Appropriately Generating Indirect Speech Acts.","venue":"AAAI","pages":"1213-1219","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BriggsS13","doi":"10.1609/AAAI.V27I1.8471","ee":"https://doi.org/10.1609/aaai.v27i1.8471","url":"https://dblp.org/rec/conf/aaai/BriggsS13"}, "url":"URL#4071785" }, { "@score":"1", "@id":"4071788", "info":{"authors":{"author":[{"@pid":"64/6978","text":"Laura E. Brown"},{"@pid":"71/6742","text":"David Kauchak"}]},"title":"EAAI-13 Preface.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BrownK13","doi":"10.1609/AAAI.V27I1.8514","ee":"https://doi.org/10.1609/aaai.v27i1.8514","url":"https://dblp.org/rec/conf/aaai/BrownK13"}, "url":"URL#4071788" }, { "@score":"1", "@id":"4071789", "info":{"authors":{"author":[{"@pid":"133/1680","text":"Danilo Bruno"},{"@pid":"59/6334","text":"Sylvain Calinon"},{"@pid":"75/287","text":"Darwin G. Caldwell"}]},"title":"Bayesian Nonparametric Multi-Optima Policy Search in Reinforcement Learning.","venue":"AAAI","pages":"1374-1380","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/BrunoCC13","doi":"10.1609/AAAI.V27I1.8542","ee":"https://doi.org/10.1609/aaai.v27i1.8542","url":"https://dblp.org/rec/conf/aaai/BrunoCC13"}, "url":"URL#4071789" }, { "@score":"1", "@id":"4071792", "info":{"authors":{"author":[{"@pid":"45/8399","text":"Shaowei Cai 0001"},{"@pid":"80/5001","text":"Kaile Su"},{"@pid":"98/10657","text":"Chuan Luo"}]},"title":"Improving WalkSAT for Random k-Satisfiability Problem with k > 3.","venue":"AAAI","pages":"145-151","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/CaiSL13","doi":"10.1609/AAAI.V27I1.8554","ee":"https://doi.org/10.1609/aaai.v27i1.8554","url":"https://dblp.org/rec/conf/aaai/CaiSL13"}, "url":"URL#4071792" }, { "@score":"1", "@id":"4071793", "info":{"authors":{"author":[{"@pid":"05/2010","text":"Cassio Polpo de Campos"},{"@pid":"g/FabioGagliardiCozman","text":"Fábio Gagliardi Cozman"}]},"title":"Complexity of Inferences in Polytree-shaped Semi-Qualitative Probabilistic Networks.","venue":"AAAI","pages":"217-223","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/CamposC13","doi":"10.1609/AAAI.V27I1.8645","ee":"https://doi.org/10.1609/aaai.v27i1.8645","url":"https://dblp.org/rec/conf/aaai/CamposC13"}, "url":"URL#4071793" }, { "@score":"1", "@id":"4071794", "info":{"authors":{"author":[{"@pid":"64/2046","text":"Nuno Cardoso"},{"@pid":"00/6243","text":"Rui Abreu 0001"}]},"title":"A Kernel Density Estimate-Based Approach to Component Goodness Modeling.","venue":"AAAI","pages":"152-158","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/CardosoA13","doi":"10.1609/AAAI.V27I1.8569","ee":"https://doi.org/10.1609/aaai.v27i1.8569","url":"https://dblp.org/rec/conf/aaai/CardosoA13"}, "url":"URL#4071794" }, { "@score":"1", "@id":"4071795", "info":{"authors":{"author":[{"@pid":"12/1772","text":"Mithun Chakraborty"},{"@pid":"30/2277","text":"Sanmay Das"},{"@pid":"56/8397","text":"Allen Lavoie"},{"@pid":"53/1994","text":"Malik Magdon-Ismail"},{"@pid":"87/7447","text":"Yonatan Naamad"}]},"title":"Instructor Rating Markets.","venue":"AAAI","pages":"159-165","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChakrabortyDLMN13","doi":"10.1609/AAAI.V27I1.8658","ee":"https://doi.org/10.1609/aaai.v27i1.8658","url":"https://dblp.org/rec/conf/aaai/ChakrabortyDLMN13"}, "url":"URL#4071795" }, { "@score":"1", "@id":"4071796", "info":{"authors":{"author":[{"@pid":"40/9513","text":"Caroline Ponzoni Carvalho Chanel"},{"@pid":"70/1418","text":"Florent Teichteil-Königsbuch"},{"@pid":"01/2858","text":"Charles Lesire"}]},"title":"Multi-Target Detection and Recognition by UAVs Using Online POMDPs.","venue":"AAAI","pages":"1381-1387","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChanelTL13","doi":"10.1609/AAAI.V27I1.8551","ee":"https://doi.org/10.1609/aaai.v27i1.8551","url":"https://dblp.org/rec/conf/aaai/ChanelTL13"}, "url":"URL#4071796" }, { "@score":"1", "@id":"4071797", "info":{"authors":{"author":[{"@pid":"117/4255","text":"Wenlin Chen"},{"@pid":"59/983-1","text":"Yixin Chen 0001"},{"@pid":"88/4801","text":"Kilian Q. Weinberger"},{"@pid":"47/6298-8","text":"Qiang Lu 0008"},{"@pid":"55/6007","text":"Xiaoping Chen"}]},"title":"Goal-Oriented Euclidean Heuristics with Manifold Learning.","venue":"AAAI","pages":"173-179","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChenCWLC13","doi":"10.1609/AAAI.V27I1.8615","ee":"https://doi.org/10.1609/aaai.v27i1.8615","url":"https://dblp.org/rec/conf/aaai/ChenCWLC13"}, "url":"URL#4071797" }, { "@score":"1", "@id":"4071798", "info":{"authors":{"author":[{"@pid":"85/7027","text":"Sibao Chen 0001"},{"@pid":"d/CHQDing","text":"Chris H. Q. Ding"},{"@pid":"36/4256-1","text":"Bin Luo 0001"},{"@pid":"51/6470","text":"Ying Xie"}]},"title":"Uncorrelated Lasso.","venue":"AAAI","pages":"166-172","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChenDLX13","doi":"10.1609/AAAI.V27I1.8576","ee":"https://doi.org/10.1609/aaai.v27i1.8576","url":"https://dblp.org/rec/conf/aaai/ChenDLX13"}, "url":"URL#4071798" }, { "@score":"1", "@id":"4071799", "info":{"authors":{"author":[{"@pid":"88/2827-19","text":"Yan Chen 0019"},{"@pid":"27/3251","text":"Jichang Zhao"},{"@pid":"24/7536","text":"Xia Hu"},{"@pid":"86/2120-1","text":"Xiaoming Zhang 0001"},{"@pid":"76/2866-1","text":"Zhoujun Li 0001"},{"@pid":"24/6606","text":"Tat-Seng Chua"}]},"title":"From Interest to Function: Location Estimation in Social Media.","venue":"AAAI","pages":"180-186","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChenZHZLC13","doi":"10.1609/AAAI.V27I1.8587","ee":"https://doi.org/10.1609/aaai.v27i1.8587","url":"https://dblp.org/rec/conf/aaai/ChenZHZLC13"}, "url":"URL#4071799" }, { "@score":"1", "@id":"4071800", "info":{"authors":{"author":[{"@pid":"00/9923","text":"Rajesh Hemant Chitnis"},{"@pid":"f/FedorVFomin","text":"Fedor V. Fomin"},{"@pid":"06/6306","text":"Petr A. Golovach"}]},"title":"Preventing Unraveling in Social Networks Gets Harder.","venue":"AAAI","pages":"1085-1091","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChitnisFG13","doi":"10.1609/AAAI.V27I1.8462","ee":"https://doi.org/10.1609/aaai.v27i1.8462","url":"https://dblp.org/rec/conf/aaai/ChitnisFG13"}, "url":"URL#4071800" }, { "@score":"1", "@id":"4071801", "info":{"authors":{"author":[{"@pid":"67/1972","text":"Arthur Choi"},{"@pid":"p/ADarwiche","text":"Adnan Darwiche"}]},"title":"Dynamic Minimization of Sentential Decision Diagrams.","venue":"AAAI","pages":"187-194","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ChoiD13","doi":"10.1609/AAAI.V27I1.8690","ee":"https://doi.org/10.1609/aaai.v27i1.8690","url":"https://dblp.org/rec/conf/aaai/ChoiD13"}, "url":"URL#4071801" }, { "@score":"1", "@id":"4071802", "info":{"authors":{"author":[{"@pid":"13/5961","text":"Alessandro Cimatti"},{"@pid":"84/7880","text":"Andrea Micheli"},{"@pid":"83/563","text":"Marco Roveri"}]},"title":"Timelines with Temporal Uncertainty.","venue":"AAAI","pages":"195-201","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/CimattiMR13","doi":"10.1609/AAAI.V27I1.8601","ee":"https://doi.org/10.1609/aaai.v27i1.8601","url":"https://dblp.org/rec/conf/aaai/CimattiMR13"}, "url":"URL#4071802" }, { "@score":"1", "@id":"4071803", "info":{"authors":{"author":{"@pid":"65/4725","text":"Sviatlana Danilava"}},"title":"Artificial Conversational Companions.","venue":"AAAI","pages":"1658-1659","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Danilava13","doi":"10.1609/AAAI.V27I1.8495","ee":"https://doi.org/10.1609/aaai.v27i1.8495","url":"https://dblp.org/rec/conf/aaai/Danilava13"}, "url":"URL#4071803" }, { "@score":"1", "@id":"4071804", "info":{"authors":{"author":[{"@pid":"33/9989","text":"Puja Das"},{"@pid":"28/8142-1","text":"Nicholas Johnson 0001"},{"@pid":"82/4807","text":"Arindam Banerjee 0001"}]},"title":"Online Lazy Updates for Portfolio Selection with Transaction Costs.","venue":"AAAI","pages":"202-208","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DasJB13","doi":"10.1609/AAAI.V27I1.8693","ee":"https://doi.org/10.1609/aaai.v27i1.8693","url":"https://dblp.org/rec/conf/aaai/DasJB13"}, "url":"URL#4071804" }, { "@score":"1", "@id":"4071805", "info":{"authors":{"author":[{"@pid":"133/1765","text":"Sammy Davis-Mendelow"},{"@pid":"85/5866","text":"Jorge A. Baier"},{"@pid":"66/3221","text":"Sheila A. McIlraith"}]},"title":"Assumption-Based Planning: Generating Plans and Explanations under Incomplete Knowledge.","venue":"AAAI","pages":"209-216","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Davis-MendelowBM13","doi":"10.1609/AAAI.V27I1.8687","ee":"https://doi.org/10.1609/aaai.v27i1.8687","url":"https://dblp.org/rec/conf/aaai/Davis-MendelowBM13"}, "url":"URL#4071805" }, { "@score":"1", "@id":"4071807", "info":{"authors":{"author":[{"@pid":"d/TGDietterich","text":"Thomas G. Dietterich"},{"@pid":"29/2926","text":"Majid Alkaee Taleghan"},{"@pid":"14/5500-1","text":"Mark Crowley 0001"}]},"title":"PAC Optimal Planning for Invasive Species Management: Improved Exploration for Reinforcement Learning from Simulator-Defined MDPs.","venue":"AAAI","pages":"1270-1276","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DietterichTC13","doi":"10.1609/AAAI.V27I1.8487","ee":"https://doi.org/10.1609/aaai.v27i1.8487","url":"https://dblp.org/rec/conf/aaai/DietterichTC13"}, "url":"URL#4071807" }, { "@score":"1", "@id":"4071808", "info":{"authors":{"author":[{"@pid":"30/5718","text":"Bistra Dilkina"},{"@pid":"92/3043","text":"Katherine J. Lai"},{"@pid":"63/7554","text":"Ronan LeBras"},{"@pid":"117/4903","text":"Yexiang Xue"},{"@pid":"g/CarlaPGomes","text":"Carla P. Gomes"},{"@pid":"13/154","text":"Ashish Sabharwal"},{"@pid":"14/3611","text":"Jordan Suter"},{"@pid":"47/9922","text":"Kevin S. McKelvey"},{"@pid":"24/9922","text":"Michael K. Schwartz"},{"@pid":"36/9923","text":"Claire A. Montgomery"}]},"title":"Large Landscape Conservation - Synthetic and Real-World Datasets.","venue":"AAAI","pages":"1369-1372","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DilkinaLLXGSSMSM13","doi":"10.1609/AAAI.V27I1.8489","ee":"https://doi.org/10.1609/aaai.v27i1.8489","url":"https://dblp.org/rec/conf/aaai/DilkinaLLXGSSMSM13"}, "url":"URL#4071808" }, { "@score":"1", "@id":"4071809", "info":{"authors":{"author":[{"@pid":"02/6787","text":"Wenkui Ding"},{"@pid":"14/6841-1","text":"Tao Qin 0001"},{"@pid":"58/6205-1","text":"Xu-Dong Zhang 0001"},{"@pid":"l/TieYanLiu","text":"Tie-Yan Liu"}]},"title":"Multi-Armed Bandit with Budget Constraint and Variable Costs.","venue":"AAAI","pages":"232-238","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DingQZL13","doi":"10.1609/AAAI.V27I1.8637","ee":"https://doi.org/10.1609/aaai.v27i1.8637","url":"https://dblp.org/rec/conf/aaai/DingQZL13"}, "url":"URL#4071809" }, { "@score":"1", "@id":"4071810", "info":{"authors":{"author":[{"@pid":"85/5090-4","text":"Li Dong 0004"},{"@pid":"72/5870","text":"Furu Wei"},{"@pid":"07/9282","text":"Yajuan Duan"},{"@pid":"31/6118","text":"Xiaohua Liu"},{"@pid":"16/1161-1","text":"Ming Zhou 0001"},{"@pid":"x/KeXu","text":"Ke Xu 0001"}]},"title":"The Automated Acquisition of Suggestions from Tweets.","venue":"AAAI","pages":"239-245","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DongWDLZX13","doi":"10.1609/AAAI.V27I1.8630","ee":"https://doi.org/10.1609/aaai.v27i1.8630","url":"https://dblp.org/rec/conf/aaai/DongWDLZX13"}, "url":"URL#4071810" }, { "@score":"1", "@id":"4071811", "info":{"authors":{"author":[{"@pid":"118/4806","text":"Mingzhi Dong"},{"@pid":"37/1759","text":"Liang Yin"}]},"title":"A Maximum K-Min Approach for Classification.","venue":"AAAI","pages":"1607-1608","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DongY13","doi":"10.1609/AAAI.V27I1.8535","ee":"https://doi.org/10.1609/aaai.v27i1.8535","url":"https://dblp.org/rec/conf/aaai/DongY13"}, "url":"URL#4071811" }, { "@score":"1", "@id":"4071812", "info":{"authors":{"author":[{"@pid":"118/4806","text":"Mingzhi Dong"},{"@pid":"37/1759","text":"Liang Yin"},{"@pid":"39/232","text":"Weihong Deng"},{"@pid":"32/4492","text":"Li Shang"},{"@pid":"204/6231","text":"Jun Guo 0002"},{"@pid":"82/1228-2","text":"Honggang Zhang 0002"}]},"title":"A Maximum K-Min Approach for Classification.","venue":"AAAI","pages":"246-252","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DongYDSGZ13","doi":"10.1609/AAAI.V27I1.8635","ee":"https://doi.org/10.1609/aaai.v27i1.8635","url":"https://dblp.org/rec/conf/aaai/DongYDSGZ13"}, "url":"URL#4071812" }, { "@score":"1", "@id":"4071813", "info":{"authors":{"author":[{"@pid":"33/8355","text":"Janardhan Rao Doppa"},{"@pid":"49/6764","text":"Alan Fern"},{"@pid":"42/4375","text":"Prasad Tadepalli"}]},"title":"HC-Search: Learning Heuristics and Cost Functions for Structured Prediction.","venue":"AAAI","pages":"253-259","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DoppaFT13","doi":"10.1609/AAAI.V27I1.8664","ee":"https://doi.org/10.1609/aaai.v27i1.8664","url":"https://dblp.org/rec/conf/aaai/DoppaFT13"}, "url":"URL#4071813" }, { "@score":"1", "@id":"4071814", "info":{"authors":{"author":{"@pid":"133/1855","text":"Gary Doran"}},"title":"Distribution Kernel Methods for Multiple-Instance Learning.","venue":"AAAI","pages":"1660-1661","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Doran13","doi":"10.1609/AAAI.V27I1.8501","ee":"https://doi.org/10.1609/aaai.v27i1.8501","url":"https://dblp.org/rec/conf/aaai/Doran13"}, "url":"URL#4071814" }, { "@score":"1", "@id":"4071815", "info":{"authors":{"author":[{"@pid":"133/1855","text":"Gary Doran"},{"@pid":"05/4624","text":"Soumya Ray"}]},"title":"SMILe: Shuffled Multiple-Instance Learning.","venue":"AAAI","pages":"260-266","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/DoranR13","doi":"10.1609/AAAI.V27I1.8651","ee":"https://doi.org/10.1609/aaai.v27i1.8651","url":"https://dblp.org/rec/conf/aaai/DoranR13"}, "url":"URL#4071815" }, { "@score":"1", "@id":"4071816", "info":{"authors":{"author":[{"@pid":"132/1868","text":"Robert Kyle Eichelberger"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"Does One-Against-All or One-Against-One Improve the Performance of Multiclass Classifications?","venue":"AAAI","pages":"1609-1610","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/EichelbergerS13","doi":"10.1609/AAAI.V27I1.8522","ee":"https://doi.org/10.1609/aaai.v27i1.8522","url":"https://dblp.org/rec/conf/aaai/EichelbergerS13"}, "url":"URL#4071816" }, { "@score":"1", "@id":"4071817", "info":{"authors":{"author":[{"@pid":"e/TEiter","text":"Thomas Eiter"},{"@pid":"f/MFink","text":"Michael Fink 0001"},{"@pid":"07/2478","text":"Thomas Krennwallner"},{"@pid":"41/9126","text":"Christoph Redl"}]},"title":"Liberal Safety for Answer Set Programs with External Sources.","venue":"AAAI","pages":"267-275","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/EiterFKR13","doi":"10.1609/AAAI.V27I1.8571","ee":"https://doi.org/10.1609/aaai.v27i1.8571","url":"https://dblp.org/rec/conf/aaai/EiterFKR13"}, "url":"URL#4071817" }, { "@score":"1", "@id":"4071818", "info":{"authors":{"author":[{"@pid":"97/2906","text":"Yagil Engel"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"}]},"title":"Posted Prices Exchange for Display Advertising Contracts.","venue":"AAAI","pages":"276-282","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/EngelT13","doi":"10.1609/AAAI.V27I1.8656","ee":"https://doi.org/10.1609/aaai.v27i1.8656","url":"https://dblp.org/rec/conf/aaai/EngelT13"}, "url":"URL#4071818" }, { "@score":"1", "@id":"4071819", "info":{"authors":{"author":[{"@pid":"25/5033","text":"Gábor Erdélyi"},{"@pid":"73/5913","text":"Martin Lackner"},{"@pid":"23/11461","text":"Andreas Pfandler"}]},"title":"Computational Aspects of Nearly Single-Peaked Electorates.","venue":"AAAI","pages":"283-289","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ErdelyiLP13","doi":"10.1609/AAAI.V27I1.8608","ee":"https://doi.org/10.1609/aaai.v27i1.8608","url":"https://dblp.org/rec/conf/aaai/ErdelyiLP13"}, "url":"URL#4071819" }, { "@score":"1", "@id":"4071820", "info":{"authors":{"author":[{"@pid":"e/EsraErdem","text":"Esra Erdem 0001"},{"@pid":"118/4613","text":"Doga Gizem Kisa"},{"@pid":"04/8909","text":"Umut Öztok"},{"@pid":"28/8219","text":"Peter Schüller"}]},"title":"A General Formal Framework for Pathfinding Problems with Multiple Agents.","venue":"AAAI","pages":"290-296","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ErdemKOS13","doi":"10.1609/AAAI.V27I1.8592","ee":"https://doi.org/10.1609/aaai.v27i1.8592","url":"https://dblp.org/rec/conf/aaai/ErdemKOS13"}, "url":"URL#4071820" }, { "@score":"1", "@id":"4071821", "info":{"authors":{"author":[{"@pid":"70/1092","text":"Lawrence H. Erickson"},{"@pid":"l/StevenMLaValle","text":"Steven M. LaValle"}]},"title":"A Simple, but NP-Hard, Motion Planning Problem.","venue":"AAAI","pages":"1388-1393","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/EricksonL13","doi":"10.1609/AAAI.V27I1.8545","ee":"https://doi.org/10.1609/aaai.v27i1.8545","url":"https://dblp.org/rec/conf/aaai/EricksonL13"}, "url":"URL#4071821" }, { "@score":"1", "@id":"4071823", "info":{"authors":{"author":[{"@pid":"f/WolfgangFaber","text":"Wolfgang Faber 0001"},{"@pid":"t/MiroslawTruszczynski","text":"Miroslaw Truszczynski"},{"@pid":"39/6130","text":"Stefan Woltran"}]},"title":"Abstract Preference Frameworks - a Unifying Perspective on Separability and Strong Equivalence.","venue":"AAAI","pages":"297-303","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FaberTW13","doi":"10.1609/AAAI.V27I1.8593","ee":"https://doi.org/10.1609/aaai.v27i1.8593","url":"https://dblp.org/rec/conf/aaai/FaberTW13"}, "url":"URL#4071823" }, { "@score":"1", "@id":"4071824", "info":{"authors":{"author":[{"@pid":"117/4917","text":"James H. Faghmous"},{"@pid":"133/1802","text":"Muhammed Uluyol"},{"@pid":"124/2282","text":"Luke Styles"},{"@pid":"133/1777","text":"Matthew Le"},{"@pid":"66/6599","text":"Varun Mithal"},{"@pid":"64/3195","text":"Shyam Boriah"},{"@pid":"k/VipinKumar-1","text":"Vipin Kumar 0001"}]},"title":"Multiple Hypothesis Object Tracking For Unsupervised Self-Learning: An Ocean Eddy Tracking Application.","venue":"AAAI","pages":"1277-1283","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FaghmousUSLMBK13","doi":"10.1609/AAAI.V27I1.8490","ee":"https://doi.org/10.1609/aaai.v27i1.8490","url":"https://dblp.org/rec/conf/aaai/FaghmousUSLMBK13"}, "url":"URL#4071824" }, { "@score":"1", "@id":"4071825", "info":{"authors":{"author":[{"@pid":"133/1691","text":"Liangda Fang"},{"@pid":"73/4188-1","text":"Yongmei Liu 0001"}]},"title":"Multiagent Knowledge and Belief Change in the Situation Calculus.","venue":"AAAI","pages":"304-312","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FangL13","doi":"10.1609/AAAI.V27I1.8698","ee":"https://doi.org/10.1609/aaai.v27i1.8698","url":"https://dblp.org/rec/conf/aaai/FangL13"}, "url":"URL#4071825" }, { "@score":"1", "@id":"4071826", "info":{"authors":{"author":[{"@pid":"f/UrielFeige","text":"Uriel Feige"},{"@pid":"52/6382","text":"Gil Kalai"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"}]},"title":"The Cascade Auction - A Mechanism for Deterring Collusion in Auctions.","venue":"AAAI","pages":"313-319","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FeigeKT13","doi":"10.1609/AAAI.V27I1.8560","ee":"https://doi.org/10.1609/aaai.v27i1.8560","url":"https://dblp.org/rec/conf/aaai/FeigeKT13"}, "url":"URL#4071826" }, { "@score":"1", "@id":"4071827", "info":{"authors":{"author":[{"@pid":"18/5149","text":"Nuno Ferreira"},{"@pid":"76/7117","text":"Samuel Mascarenhas"},{"@pid":"92/5819","text":"Ana Paiva 0001"},{"@pid":"61/1614","text":"Gennaro di Tosto"},{"@pid":"d/FrankDignum","text":"Frank Dignum"},{"@pid":"129/0253","text":"John McBreen"},{"@pid":"118/8308","text":"Nick Degens"},{"@pid":"62/1643","text":"Gert Jan Hofstede"},{"@pid":"87/4126","text":"Giulia Andrighetto"},{"@pid":"53/3352","text":"Rosaria Conte"}]},"title":"An Agent Model for the Appraisal of Normative Events Based in In-Group and Out-Group Relations.","venue":"AAAI","pages":"1220-1226","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FerreiraMPTDMDHAC13","doi":"10.1609/AAAI.V27I1.8474","ee":"https://doi.org/10.1609/aaai.v27i1.8474","url":"https://dblp.org/rec/conf/aaai/FerreiraMPTDMDHAC13"}, "url":"URL#4071827" }, { "@score":"1", "@id":"4071828", "info":{"authors":{"author":{"@pid":"46/7137","text":"Johannes Klaus Fichte"}},"title":"Backdoors to Tractability of Answer-Set Programming.","venue":"AAAI","pages":"1662-1663","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Fichte13","doi":"10.1609/AAAI.V27I1.8505","ee":"https://doi.org/10.1609/aaai.v27i1.8505","url":"https://dblp.org/rec/conf/aaai/Fichte13"}, "url":"URL#4071828" }, { "@score":"1", "@id":"4071829", "info":{"authors":{"author":[{"@pid":"46/7137","text":"Johannes Klaus Fichte"},{"@pid":"s/StefanSzeider","text":"Stefan Szeider"}]},"title":"Backdoors to Normality for Disjunctive Logic Programs.","venue":"AAAI","pages":"320-327","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FichteS13","doi":"10.1609/AAAI.V27I1.8624","ee":"https://doi.org/10.1609/aaai.v27i1.8624","url":"https://dblp.org/rec/conf/aaai/FichteS13"}, "url":"URL#4071829" }, { "@score":"1", "@id":"4071830", "info":{"authors":{"author":[{"@pid":"38/1215","text":"Alejandro Figueroa 0001"},{"@pid":"94/2519","text":"Guenter Neumann"}]},"title":"Learning to Rank Effective Paraphrases from Query Logs for Community Question Answering.","venue":"AAAI","pages":"1099-1105","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FigueroaN13","doi":"10.1609/AAAI.V27I1.8453","ee":"https://doi.org/10.1609/aaai.v27i1.8453","url":"https://dblp.org/rec/conf/aaai/FigueroaN13"}, "url":"URL#4071830" }, { "@score":"1", "@id":"4071831", "info":{"authors":{"author":[{"@pid":"47/5171-2","text":"Daniel Fink 0002"},{"@pid":"31/1929","text":"Theodoros Damoulas"},{"@pid":"133/1688","text":"Jaimin Dave"}]},"title":"Adaptive Spatio-Temporal Exploratory Models: Hemisphere-wide species distributions from massively crowdsourced eBird data.","venue":"AAAI","pages":"1284-1290","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FinkDD13","doi":"10.1609/AAAI.V27I1.8484","ee":"https://doi.org/10.1609/aaai.v27i1.8484","url":"https://dblp.org/rec/conf/aaai/FinkDD13"}, "url":"URL#4071831" }, { "@score":"1", "@id":"4071834", "info":{"authors":{"author":[{"@pid":"02/2520","text":"Yasuhiro Fujiwara"},{"@pid":"86/2250","text":"Makoto Nakatsuji"},{"@pid":"97/8184","text":"Hiroaki Shiokawa"},{"@pid":"88/4875","text":"Takeshi Mishima"},{"@pid":"19/3497","text":"Makoto Onizuka"}]},"title":"Fast and Exact Top-k Algorithm for PageRank.","venue":"AAAI","pages":"1106-1112","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/FujiwaraNSMO13","doi":"10.1609/AAAI.V27I1.8454","ee":"https://doi.org/10.1609/aaai.v27i1.8454","url":"https://dblp.org/rec/conf/aaai/FujiwaraNSMO13"}, "url":"URL#4071834" }, { "@score":"1", "@id":"4071835", "info":{"authors":{"author":[{"@pid":"49/3619","text":"Lisa Gandy"},{"@pid":"133/1781","text":"Nadji Allan"},{"@pid":"133/1787","text":"Mark Atallah"},{"@pid":"f/OphirFrieder","text":"Ophir Frieder"},{"@pid":"20/10437","text":"Newton Howard"},{"@pid":"118/8746","text":"Sergey Kanareykin"},{"@pid":"k/MosheKoppel","text":"Moshe Koppel"},{"@pid":"84/2603","text":"Mark Last"},{"@pid":"58/5656","text":"Yair Neuman"},{"@pid":"a/ShlomoArgamon","text":"Shlomo Argamon"}]},"title":"Automatic Identification of Conceptual Metaphors With Limited Knowledge.","venue":"AAAI","pages":"328-334","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GandyAAFHKKLNA13","doi":"10.1609/AAAI.V27I1.8648","ee":"https://doi.org/10.1609/aaai.v27i1.8648","url":"https://dblp.org/rec/conf/aaai/GandyAAFHKKLNA13"}, "url":"URL#4071835" }, { "@score":"1", "@id":"4071837", "info":{"authors":{"author":[{"@pid":"28/8663","text":"Vikas K. Garg"},{"@pid":"j/TSJayram","text":"T. S. Jayram"},{"@pid":"12/5012","text":"Balakrishnan Narayanaswamy"}]},"title":"Online Optimization with Dynamic Temporal Uncertainty: Incorporating Short Term Predictions for Renewable Integration in Intelligent Energy Systems.","venue":"AAAI","pages":"1291-1297","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GargJN13","doi":"10.1609/AAAI.V27I1.8480","ee":"https://doi.org/10.1609/aaai.v27i1.8480","url":"https://dblp.org/rec/conf/aaai/GargJN13"}, "url":"URL#4071837" }, { "@score":"1", "@id":"4071838", "info":{"authors":{"author":[{"@pid":"g/NicolaGatti","text":"Nicola Gatti 0001"},{"@pid":"02/10482","text":"Fabio Panozzo"},{"@pid":"64/1011","text":"Marcello Restelli"}]},"title":"Efficient Evolutionary Dynamics with Extensive-Form Games.","venue":"AAAI","pages":"335-341","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GattiPR13","doi":"10.1609/AAAI.V27I1.8600","ee":"https://doi.org/10.1609/aaai.v27i1.8600","url":"https://dblp.org/rec/conf/aaai/GattiPR13"}, "url":"URL#4071838" }, { "@score":"1", "@id":"4071839", "info":{"authors":{"author":[{"@pid":"g/NicolaGatti","text":"Nicola Gatti 0001"},{"@pid":"70/8523","text":"Marco Rocco"},{"@pid":"s/TuomasSandholm","text":"Tuomas Sandholm"}]},"title":"Algorithms for Strong Nash Equilibrium with More than Two Agents.","venue":"AAAI","pages":"342-349","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GattiRS13","doi":"10.1609/AAAI.V27I1.8652","ee":"https://doi.org/10.1609/aaai.v27i1.8652","url":"https://dblp.org/rec/conf/aaai/GattiRS13"}, "url":"URL#4071839" }, { "@score":"1", "@id":"4071841", "info":{"authors":{"author":[{"@pid":"64/2589","text":"Martin Gebser"},{"@pid":"60/3303","text":"Benjamin Kaufmann"},{"@pid":"149/1314","text":"Javier Romero 0003"},{"@pid":"133/1804","text":"Ramón Otero"},{"@pid":"s/TorstenSchaub","text":"Torsten Schaub"},{"@pid":"133/1829","text":"Philipp Wanko"}]},"title":"Domain-Specific Heuristics in Answer Set Programming.","venue":"AAAI","pages":"350-356","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GebserKROSW13","doi":"10.1609/AAAI.V27I1.8585","ee":"https://doi.org/10.1609/aaai.v27i1.8585","url":"https://dblp.org/rec/conf/aaai/GebserKROSW13"}, "url":"URL#4071841" }, { "@score":"1", "@id":"4071844", "info":{"authors":{"author":[{"@pid":"133/1834","text":"Daniel J. Geschwender"},{"@pid":"70/574","text":"Shant Karakashian"},{"@pid":"30/8009","text":"Robert J. Woodward"},{"@pid":"64/4385","text":"Berthe Y. Choueiry"},{"@pid":"24/4926","text":"Stephen D. Scott 0001"}]},"title":"Selecting the Appropriate Consistency Algorithm for CSPs Using Machine Learning Classifiers.","venue":"AAAI","pages":"1611-1612","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GeschwenderKWCS13","doi":"10.1609/AAAI.V27I1.8532","ee":"https://doi.org/10.1609/aaai.v27i1.8532","url":"https://dblp.org/rec/conf/aaai/GeschwenderKWCS13"}, "url":"URL#4071844" }, { "@score":"1", "@id":"4071846", "info":{"authors":{"author":[{"@pid":"131/6631","text":"Reza Shoja Ghiass"},{"@pid":"98/5718","text":"Ognjen Arandjelovic"},{"@pid":"38/3888","text":"Hakim Bendada"},{"@pid":"67/4027","text":"Xavier Maldague"}]},"title":"Vesselness Features and the Inverse Compositional AAM for Robust Face Recognition Using Thermal IR.","venue":"AAAI","pages":"357-364","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GhiassABM13","doi":"10.1609/AAAI.V27I1.8628","ee":"https://doi.org/10.1609/aaai.v27i1.8628","url":"https://dblp.org/rec/conf/aaai/GhiassABM13"}, "url":"URL#4071846" }, { "@score":"1", "@id":"4071847", "info":{"authors":{"author":[{"@pid":"63/10964","text":"Debarghya Ghoshdastidar"},{"@pid":"64/1176","text":"Ambedkar Dukkipati"}]},"title":"On Power-Law Kernels, Corresponding Reproducing Kernel Hilbert Space and Applications.","venue":"AAAI","pages":"365-371","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GhoshdastidarD13","doi":"10.1609/AAAI.V27I1.8555","ee":"https://doi.org/10.1609/aaai.v27i1.8555","url":"https://dblp.org/rec/conf/aaai/GhoshdastidarD13"}, "url":"URL#4071847" }, { "@score":"1", "@id":"4071848", "info":{"authors":{"author":[{"@pid":"74/9988","text":"Sean Gilpin"},{"@pid":"71/709","text":"Siegfried Nijssen"},{"@pid":"81/2360","text":"Ian N. Davidson"}]},"title":"Formalizing Hierarchical Clustering as Integer Linear Programming.","venue":"AAAI","pages":"372-378","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GilpinND13","doi":"10.1609/AAAI.V27I1.8671","ee":"https://doi.org/10.1609/aaai.v27i1.8671","url":"https://dblp.org/rec/conf/aaai/GilpinND13"}, "url":"URL#4071848" }, { "@score":"1", "@id":"4071851", "info":{"authors":{"author":{"@pid":"39/6990","text":"Kevin Gold"}},"title":"Learning to Efficiently Pursue Communication Goals on the Web with the GOSMR Architecture.","venue":"AAAI","pages":"1227-1233","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Gold13","doi":"10.1609/AAAI.V27I1.8469","ee":"https://doi.org/10.1609/aaai.v27i1.8469","url":"https://dblp.org/rec/conf/aaai/Gold13"}, "url":"URL#4071851" }, { "@score":"1", "@id":"4071853", "info":{"authors":{"author":[{"@pid":"g/BenjaminNGrosof","text":"Benjamin Nathan Grosof"},{"@pid":"22/6962","text":"Terrance Swift"}]},"title":"Radial Restraint: A Semantically Clean Approach to Bounded Rationality for Logic Programs.","venue":"AAAI","pages":"379-386","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/GrosofS13","doi":"10.1609/AAAI.V27I1.8682","ee":"https://doi.org/10.1609/aaai.v27i1.8682","url":"https://dblp.org/rec/conf/aaai/GrosofS13"}, "url":"URL#4071853" }, { "@score":"1", "@id":"4071856", "info":{"authors":{"author":{"@pid":"34/5185","text":"Yuhong Guo"}},"title":"Convex Subspace Representation Learning from Multi-View Data.","venue":"AAAI","pages":"387-393","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Guo13","doi":"10.1609/AAAI.V27I1.8565","ee":"https://doi.org/10.1609/aaai.v27i1.8565","url":"https://dblp.org/rec/conf/aaai/Guo13"}, "url":"URL#4071856" }, { "@score":"1", "@id":"4071857", "info":{"authors":{"author":{"@pid":"117/4914","text":"Shekhar Gupta"}},"title":"An Optimal Task Assignment Policy and Performance Diagnosis Strategy for Heterogeneous Hadoop Cluster.","venue":"AAAI","pages":"1664-1665","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Gupta13","doi":"10.1609/AAAI.V27I1.8497","ee":"https://doi.org/10.1609/aaai.v27i1.8497","url":"https://dblp.org/rec/conf/aaai/Gupta13"}, "url":"URL#4071857" }, { "@score":"1", "@id":"4071858", "info":{"authors":{"author":[{"@pid":"00/10827","text":"Ronald de Haan"},{"@pid":"130/3674","text":"Anna Roubícková"},{"@pid":"s/StefanSzeider","text":"Stefan Szeider"}]},"title":"Parameterized Complexity Results for Plan Reuse.","venue":"AAAI","pages":"224-231","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HaanRS13","doi":"10.1609/AAAI.V27I1.8655","ee":"https://doi.org/10.1609/aaai.v27i1.8655","url":"https://dblp.org/rec/conf/aaai/HaanRS13"}, "url":"URL#4071858" }, { "@score":"1", "@id":"4071859", "info":{"authors":{"author":[{"@pid":"13/8399","text":"Fabian Hadiji"},{"@pid":"40/3793","text":"Kristian Kersting"}]},"title":"Reduce and Re-Lift: Bootstrapped Lifted Likelihood Maximization for MAP.","venue":"AAAI","pages":"394-400","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HadijiK13","doi":"10.1609/AAAI.V27I1.8647","ee":"https://doi.org/10.1609/aaai.v27i1.8647","url":"https://dblp.org/rec/conf/aaai/HadijiK13"}, "url":"URL#4071859" }, { "@score":"1", "@id":"4071861", "info":{"authors":{"author":[{"@pid":"133/1819","text":"Chen Hajaj"},{"@pid":"80/1237","text":"Noam Hazon"},{"@pid":"03/5237","text":"David Sarne"},{"@pid":"71/10481","text":"Avshalom Elmalech"}]},"title":"Search More, Disclose Less.","venue":"AAAI","pages":"401-408","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HajajHSE13","doi":"10.1609/AAAI.V27I1.8607","ee":"https://doi.org/10.1609/aaai.v27i1.8607","url":"https://dblp.org/rec/conf/aaai/HajajHSE13"}, "url":"URL#4071861" }, { "@score":"1", "@id":"4071863", "info":{"authors":{"author":[{"@pid":"130/0877","text":"Keisuke Hara"},{"@pid":"24/1535-1","text":"Takayuki Ito 0001"}]},"title":"A Mediation Mechanism for Automated Negotiating Agents Whose Utility Changes over Time.","venue":"AAAI","pages":"1613-1614","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HaraI13","doi":"10.1609/AAAI.V27I1.8525","ee":"https://doi.org/10.1609/aaai.v27i1.8525","url":"https://dblp.org/rec/conf/aaai/HaraI13"}, "url":"URL#4071863" }, { "@score":"1", "@id":"4071864", "info":{"authors":{"author":{"@pid":"61/8820","text":"Brent Edward Harrison"}},"title":"Creating Model-Based Adaptive Environments Using Game-Specific and Game-Independent Analytics.","venue":"AAAI","pages":"1666-1667","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Harrison13","doi":"10.1609/AAAI.V27I1.8503","ee":"https://doi.org/10.1609/aaai.v27i1.8503","url":"https://dblp.org/rec/conf/aaai/Harrison13"}, "url":"URL#4071864" }, { "@score":"1", "@id":"4071865", "info":{"authors":{"author":[{"@pid":"131/5147","text":"Mohammad Rashedul Hasan"},{"@pid":"93/5894","text":"Anita Raja"}]},"title":"The Role of Complex Network Dynamics in the Emergence of Multiagent Coalition.","venue":"AAAI","pages":"1615-1616","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HasanR13","doi":"10.1609/AAAI.V27I1.8537","ee":"https://doi.org/10.1609/aaai.v27i1.8537","url":"https://dblp.org/rec/conf/aaai/HasanR13"}, "url":"URL#4071865" }, { "@score":"1", "@id":"4071866", "info":{"authors":{"author":{"@pid":"81/9923","text":"Matthew Hatem"}},"title":"Heuristic Search for Large Problems with Real Costs.","venue":"AAAI","pages":"1668-1669","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Hatem13","doi":"10.1609/AAAI.V27I1.8492","ee":"https://doi.org/10.1609/aaai.v27i1.8492","url":"https://dblp.org/rec/conf/aaai/Hatem13"}, "url":"URL#4071866" }, { "@score":"1", "@id":"4071867", "info":{"authors":{"author":[{"@pid":"81/9923","text":"Matthew Hatem"},{"@pid":"80/5790","text":"Wheeler Ruml"}]},"title":"External Memory Best-First Search for Multiple Sequence Alignment.","venue":"AAAI","pages":"409-416","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HatemR13","doi":"10.1609/AAAI.V27I1.8626","ee":"https://doi.org/10.1609/aaai.v27i1.8626","url":"https://dblp.org/rec/conf/aaai/HatemR13"}, "url":"URL#4071867" }, { "@score":"1", "@id":"4071869", "info":{"authors":{"author":[{"@pid":"51/8653","text":"Edward Hsiao"},{"@pid":"h/MartialHebert","text":"Martial Hebert"}]},"title":"Gradient Networks: Explicit Shape Matching Without Extracting Edges.","venue":"AAAI","pages":"417-423","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HsiaoH13","doi":"10.1609/AAAI.V27I1.8559","ee":"https://doi.org/10.1609/aaai.v27i1.8559","url":"https://dblp.org/rec/conf/aaai/HsiaoH13"}, "url":"URL#4071869" }, { "@score":"1", "@id":"4071870", "info":{"authors":{"author":[{"@pid":"49/2488","text":"Jin Huang"},{"@pid":"80/5755","text":"Feiping Nie 0001"},{"@pid":"03/281","text":"Heng Huang"}]},"title":"Robust Discrete Matrix Completion.","venue":"AAAI","pages":"424-430","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HuangNH13","doi":"10.1609/AAAI.V27I1.8675","ee":"https://doi.org/10.1609/aaai.v27i1.8675","url":"https://dblp.org/rec/conf/aaai/HuangNH13"}, "url":"URL#4071870" }, { "@score":"1", "@id":"4071871", "info":{"authors":{"author":[{"@pid":"49/2488","text":"Jin Huang"},{"@pid":"80/5755","text":"Feiping Nie 0001"},{"@pid":"03/281","text":"Heng Huang"}]},"title":"Spectral Rotation versus K-Means in Spectral Clustering.","venue":"AAAI","pages":"431-437","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HuangNH13a","doi":"10.1609/AAAI.V27I1.8683","ee":"https://doi.org/10.1609/aaai.v27i1.8683","url":"https://dblp.org/rec/conf/aaai/HuangNH13a"}, "url":"URL#4071871" }, { "@score":"1", "@id":"4071872", "info":{"authors":{"author":[{"@pid":"49/2488","text":"Jin Huang"},{"@pid":"80/5755","text":"Feiping Nie 0001"},{"@pid":"03/281","text":"Heng Huang"},{"@pid":"d/CHQDing","text":"Chris H. Q. Ding"}]},"title":"Supervised and Projected Sparse Coding for Image Classification.","venue":"AAAI","pages":"438-444","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/HuangNHD13","doi":"10.1609/AAAI.V27I1.8691","ee":"https://doi.org/10.1609/aaai.v27i1.8691","url":"https://dblp.org/rec/conf/aaai/HuangNHD13"}, "url":"URL#4071872" }, { "@score":"1", "@id":"4071876", "info":{"authors":{"author":[{"@pid":"29/5953","text":"Tomoharu Iwata"},{"@pid":"68/6820","text":"Tsutomu Hirao"},{"@pid":"87/2491","text":"Naonori Ueda"}]},"title":"Unsupervised Cluster Matching via Probabilistic Latent Variable Models.","venue":"AAAI","pages":"445-451","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/IwataHU13","doi":"10.1609/AAAI.V27I1.8558","ee":"https://doi.org/10.1609/aaai.v27i1.8558","url":"https://dblp.org/rec/conf/aaai/IwataHU13"}, "url":"URL#4071876" }, { "@score":"1", "@id":"4071877", "info":{"authors":{"author":[{"@pid":"97/1893","text":"Marie desJardins"},{"@pid":"l/MLLittman","text":"Michael L. Littman"}]},"title":"AAAI-13 Preface.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/JardinsL13","doi":"10.1609/AAAI.V27I1.8512","ee":"https://doi.org/10.1609/aaai.v27i1.8512","url":"https://dblp.org/rec/conf/aaai/JardinsL13"}, "url":"URL#4071877" }, { "@score":"1", "@id":"4071878", "info":{"authors":{"author":[{"@pid":"133/1696","text":"Zhichun Jia"},{"@pid":"22/6904","text":"Rong Chen"}]},"title":"Hybrid Model-Based Diagnosis of Web Service Compositions.","venue":"AAAI","pages":"1617-1618","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/JiaC13","doi":"10.1609/AAAI.V27I1.8517","ee":"https://doi.org/10.1609/aaai.v27i1.8517","url":"https://dblp.org/rec/conf/aaai/JiaC13"}, "url":"URL#4071878" }, { "@score":"1", "@id":"4071879", "info":{"authors":{"author":[{"@pid":"24/5818","text":"Yu-Gang Jiang"},{"@pid":"64/3235","text":"Yanran Wang"},{"@pid":"28/4423","text":"Rui Feng"},{"@pid":"84/3791","text":"Xiangyang Xue"},{"@pid":"04/6699","text":"Yingbin Zheng"},{"@pid":"60/11321","text":"Hanfang Yang"}]},"title":"Understanding and Predicting Interestingness of Videos.","venue":"AAAI","pages":"1113-1119","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/JiangWFXZY13","doi":"10.1609/AAAI.V27I1.8457","ee":"https://doi.org/10.1609/aaai.v27i1.8457","url":"https://dblp.org/rec/conf/aaai/JiangWFXZY13"}, "url":"URL#4071879" }, { "@score":"1", "@id":"4071882", "info":{"authors":{"author":[{"@pid":"117/4868","text":"Hiroshi Kajino"},{"@pid":"71/3718","text":"Yuta Tsuboi"},{"@pid":"27/4448","text":"Hisashi Kashima"}]},"title":"Clustering Crowds.","venue":"AAAI","pages":"1120-1127","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KajinoTK13","doi":"10.1609/AAAI.V27I1.8456","ee":"https://doi.org/10.1609/aaai.v27i1.8456","url":"https://dblp.org/rec/conf/aaai/KajinoTK13"}, "url":"URL#4071882" }, { "@score":"1", "@id":"4071883", "info":{"authors":{"author":[{"@pid":"60/6727","text":"Thomas Kalinowski"},{"@pid":"87/3366","text":"Nina Narodytska"},{"@pid":"86/2576","text":"Toby Walsh"},{"@pid":"73/4036","text":"Lirong Xia"}]},"title":"Strategic Behavior when Allocating Indivisible Goods Sequentially.","venue":"AAAI","pages":"452-458","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KalinowskiNWX13","doi":"10.1609/AAAI.V27I1.8697","ee":"https://doi.org/10.1609/aaai.v27i1.8697","url":"https://dblp.org/rec/conf/aaai/KalinowskiNWX13"}, "url":"URL#4071883" }, { "@score":"1", "@id":"4071884", "info":{"authors":{"author":[{"@pid":"129/1269","text":"Soumya C. Kambhampati"},{"@pid":"129/1613","text":"Thomas Liu"}]},"title":"Phase Transition and Network Structure in Realistic SAT Problems.","venue":"AAAI","pages":"1619-1620","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KambhampatiL13","doi":"10.1609/AAAI.V27I1.8529","ee":"https://doi.org/10.1609/aaai.v27i1.8529","url":"https://dblp.org/rec/conf/aaai/KambhampatiL13"}, "url":"URL#4071884" }, { "@score":"1", "@id":"4071885", "info":{"authors":{"author":[{"@pid":"85/8172","text":"Jeon-Hyung Kang"},{"@pid":"99/433","text":"Kristina Lerman"}]},"title":"LA-CTR: A Limited Attention Collaborative Topic Regression for Social Media.","venue":"AAAI","pages":"1128-1134","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KangL13","doi":"10.1609/AAAI.V27I1.8451","ee":"https://doi.org/10.1609/aaai.v27i1.8451","url":"https://dblp.org/rec/conf/aaai/KangL13"}, "url":"URL#4071885" }, { "@score":"1", "@id":"4071886", "info":{"authors":{"author":[{"@pid":"93/86","text":"Iyad A. Kanj"},{"@pid":"s/StefanSzeider","text":"Stefan Szeider"}]},"title":"On the Subexponential Time Complexity of CSP.","venue":"AAAI","pages":"459-465","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KanjS13","doi":"10.1609/AAAI.V27I1.8609","ee":"https://doi.org/10.1609/aaai.v27i1.8609","url":"https://dblp.org/rec/conf/aaai/KanjS13"}, "url":"URL#4071886" }, { "@score":"1", "@id":"4071887", "info":{"authors":{"author":[{"@pid":"70/574","text":"Shant Karakashian"},{"@pid":"30/8009","text":"Robert J. Woodward"},{"@pid":"64/4385","text":"Berthe Y. Choueiry"}]},"title":"Improving the Performance of Consistency Algorithms by Localizing and Bolstering Propagation in a Tree Decomposition.","venue":"AAAI","pages":"466-473","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KarakashianWC13","doi":"10.1609/AAAI.V27I1.8594","ee":"https://doi.org/10.1609/aaai.v27i1.8594","url":"https://dblp.org/rec/conf/aaai/KarakashianWC13"}, "url":"URL#4071887" }, { "@score":"1", "@id":"4071888", "info":{"authors":{"author":[{"@pid":"92/7121","text":"Erez Karpas"},{"@pid":"51/8415","text":"Tomer Sagi"},{"@pid":"d/CarmelDomshlak","text":"Carmel Domshlak"},{"@pid":"g/AvigdorGal","text":"Avigdor Gal"},{"@pid":"01/1397","text":"Avi Mendelson"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"}]},"title":"Data-Parallel Computing Meets STRIPS.","venue":"AAAI","pages":"474-480","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KarpasSDGMT13","doi":"10.1609/AAAI.V27I1.8590","ee":"https://doi.org/10.1609/aaai.v27i1.8590","url":"https://dblp.org/rec/conf/aaai/KarpasSDGMT13"}, "url":"URL#4071888" }, { "@score":"1", "@id":"4071889", "info":{"authors":{"author":[{"@pid":"61/6509","text":"George Katsirelos"},{"@pid":"13/154","text":"Ashish Sabharwal"},{"@pid":"13/2167","text":"Horst Samulowitz"},{"@pid":"90/5314","text":"Laurent Simon"}]},"title":"Resolution and Parallelizability: Barriers to the Efficient Parallelization of SAT Solvers.","venue":"AAAI","pages":"481-488","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KatsirelosSSS13","doi":"10.1609/AAAI.V27I1.8660","ee":"https://doi.org/10.1609/aaai.v27i1.8660","url":"https://dblp.org/rec/conf/aaai/KatsirelosSSS13"}, "url":"URL#4071889" }, { "@score":"1", "@id":"4071890", "info":{"authors":{"author":[{"@pid":"75/1295-1","text":"Michael Katz 0001"},{"@pid":"26/836","text":"Jörg Hoffmann 0001"},{"@pid":"d/CarmelDomshlak","text":"Carmel Domshlak"}]},"title":"Red-Black Relaxed Plan Heuristics.","venue":"AAAI","pages":"489-495","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KatzHD13","doi":"10.1609/AAAI.V27I1.8644","ee":"https://doi.org/10.1609/aaai.v27i1.8644","url":"https://dblp.org/rec/conf/aaai/KatzHD13"}, "url":"URL#4071890" }, { "@score":"1", "@id":"4071891", "info":{"authors":{"author":[{"@pid":"19/502","text":"Aram Kawewong"},{"@pid":"126/4414","text":"Rapeeporn Pimup"},{"@pid":"71/4386","text":"Osamu Hasegawa"}]},"title":"Incremental Learning Framework for Indoor Scene Recognition.","venue":"AAAI","pages":"496-502","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KawewongPH13","doi":"10.1609/AAAI.V27I1.8584","ee":"https://doi.org/10.1609/aaai.v27i1.8584","url":"https://dblp.org/rec/conf/aaai/KawewongPH13"}, "url":"URL#4071891" }, { "@score":"1", "@id":"4071892", "info":{"authors":{"author":[{"@pid":"57/6942","text":"Wolfgang Ketter"},{"@pid":"37/188","text":"Markus Peters"},{"@pid":"02/5968","text":"John Collins"}]},"title":"Autonomous Agents in Future Energy Markets: The 2012 Power Trading Agent Competition.","venue":"AAAI","pages":"1298-1304","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KetterPC13","doi":"10.1609/AAAI.V27I1.8479","ee":"https://doi.org/10.1609/aaai.v27i1.8479","url":"https://dblp.org/rec/conf/aaai/KetterPC13"}, "url":"URL#4071892" }, { "@score":"1", "@id":"4071893", "info":{"authors":{"author":[{"@pid":"89/11240","text":"Koosha Khalvati"},{"@pid":"m/AlanKMackworth","text":"Alan K. Mackworth"}]},"title":"A Fast Pairwise Heuristic for Planning under Uncertainty.","venue":"AAAI","pages":"503-509","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KhalvatiM13","doi":"10.1609/AAAI.V27I1.8672","ee":"https://doi.org/10.1609/aaai.v27i1.8672","url":"https://dblp.org/rec/conf/aaai/KhalvatiM13"}, "url":"URL#4071893" }, { "@score":"1", "@id":"4071895", "info":{"authors":{"author":[{"@pid":"66/1831","text":"Kye-Hyeon Kim"},{"@pid":"56/4864","text":"Seungjin Choi"}]},"title":"Walking on Minimax Paths for k-NN Search.","venue":"AAAI","pages":"518-525","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KimC13","doi":"10.1609/AAAI.V27I1.8588","ee":"https://doi.org/10.1609/aaai.v27i1.8588","url":"https://dblp.org/rec/conf/aaai/KimC13"}, "url":"URL#4071895" }, { "@score":"1", "@id":"4071896", "info":{"authors":{"author":[{"@pid":"77/8365","text":"Been Kim"},{"@pid":"131/6833","text":"Caleb M. Chacha"},{"@pid":"30/6778","text":"Julie A. Shah"}]},"title":"Inferring Robot Task Plans from Human Team Meetings: A Generative Modeling Approach with Logic-Based Prior.","venue":"AAAI","pages":"1394-1400","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KimCS13","doi":"10.1609/AAAI.V27I1.8548","ee":"https://doi.org/10.1609/aaai.v27i1.8548","url":"https://dblp.org/rec/conf/aaai/KimCS13"}, "url":"URL#4071896" }, { "@score":"1", "@id":"4071898", "info":{"authors":{"author":[{"@pid":"33/4227","text":"Doo Soon Kim"},{"@pid":"v/KunalVerma","text":"Kunal Verma"},{"@pid":"94/1540","text":"Peter Z. Yeh"}]},"title":"Joint Extraction and Labeling via Graph Propagation for Dictionary Construction.","venue":"AAAI","pages":"510-517","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KimVY13","doi":"10.1609/AAAI.V27I1.8597","ee":"https://doi.org/10.1609/aaai.v27i1.8597","url":"https://dblp.org/rec/conf/aaai/KimVY13"}, "url":"URL#4071898" }, { "@score":"1", "@id":"4071899", "info":{"authors":{"author":[{"@pid":"55/8339","text":"Suin Kim"},{"@pid":"16/2294","text":"Jianwen Zhang"},{"@pid":"33/2592-1","text":"Zheng Chen 0001"},{"@pid":"50/7562","text":"Alice Oh"},{"@pid":"22/904","text":"Shixia Liu"}]},"title":"A Hierarchical Aspect-Sentiment Model for Online Reviews.","venue":"AAAI","pages":"526-533","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KimZCOL13","doi":"10.1609/AAAI.V27I1.8700","ee":"https://doi.org/10.1609/aaai.v27i1.8700","url":"https://dblp.org/rec/conf/aaai/KimZCOL13"}, "url":"URL#4071899" }, { "@score":"1", "@id":"4071901", "info":{"authors":{"author":[{"@pid":"94/248","text":"Pushmeet Kohli"},{"@pid":"84/3120","text":"Mahyar Salek"},{"@pid":"133/1790","text":"Greg Stoddard"}]},"title":"A Fast Bandit Algorithm for Recommendation to Users With Heterogenous Tastes.","venue":"AAAI","pages":"1135-1141","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KohliSS13","doi":"10.1609/AAAI.V27I1.8463","ee":"https://doi.org/10.1609/aaai.v27i1.8463","url":"https://dblp.org/rec/conf/aaai/KohliSS13"}, "url":"URL#4071901" }, { "@score":"1", "@id":"4071903", "info":{"authors":{"author":[{"@pid":"22/7920","text":"Egor V. Kostylev"},{"@pid":"36/27","text":"Juan L. Reutter"}]},"title":"Answering Counting Aggregate Queries over Ontologies of the DL-Lite Family.","venue":"AAAI","pages":"534-540","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KostylevR13","doi":"10.1609/AAAI.V27I1.8646","ee":"https://doi.org/10.1609/aaai.v27i1.8646","url":"https://dblp.org/rec/conf/aaai/KostylevR13"}, "url":"URL#4071903" }, { "@score":"1", "@id":"4071904", "info":{"authors":{"author":[{"@pid":"133/1689","text":"Niveda Krishnamoorthy"},{"@pid":"133/1794","text":"Girish Malkarnenkar"},{"@pid":"m/RaymondJMooney","text":"Raymond J. Mooney"},{"@pid":"88/2754","text":"Kate Saenko"},{"@pid":"89/2073","text":"Sergio Guadarrama"}]},"title":"Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.","venue":"AAAI","pages":"541-547","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KrishnamoorthyMMSG13","doi":"10.1609/AAAI.V27I1.8679","ee":"https://doi.org/10.1609/aaai.v27i1.8679","url":"https://dblp.org/rec/conf/aaai/KrishnamoorthyMMSG13"}, "url":"URL#4071904" }, { "@score":"1", "@id":"4071905", "info":{"authors":{"author":[{"@pid":"22/6935","text":"T. K. Satish Kumar"},{"@pid":"10/1524","text":"Marcello Cirillo"},{"@pid":"k/SvenKoenig","text":"Sven Koenig"}]},"title":"Simple Temporal Problems with Taboo Regions.","venue":"AAAI","pages":"548-554","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KumarCK13","doi":"10.1609/AAAI.V27I1.8694","ee":"https://doi.org/10.1609/aaai.v27i1.8694","url":"https://dblp.org/rec/conf/aaai/KumarCK13"}, "url":"URL#4071905" }, { "@score":"1", "@id":"4071907", "info":{"authors":{"author":[{"@pid":"133/1701","text":"Andras Gabor Kupcsik"},{"@pid":"76/5043","text":"Marc Peter Deisenroth"},{"@pid":"p/JanPeters1","text":"Jan Peters 0001"},{"@pid":"60/4878","text":"Gerhard Neumann"}]},"title":"Data-Efficient Generalization of Robot Skills with Contextual Policy Search.","venue":"AAAI","pages":"1401-1407","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KupcsikDPN13","doi":"10.1609/AAAI.V27I1.8546","ee":"https://doi.org/10.1609/aaai.v27i1.8546","url":"https://dblp.org/rec/conf/aaai/KupcsikDPN13"}, "url":"URL#4071907" }, { "@score":"1", "@id":"4071908", "info":{"authors":{"author":[{"@pid":"57/10871","text":"David Kurokawa"},{"@pid":"06/9923","text":"John K. Lai"},{"@pid":"p/ArielDProcaccia","text":"Ariel D. Procaccia"}]},"title":"How to Cut a Cake Before the Party Ends.","venue":"AAAI","pages":"555-561","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KurokawaLP13","doi":"10.1609/AAAI.V27I1.8629","ee":"https://doi.org/10.1609/aaai.v27i1.8629","url":"https://dblp.org/rec/conf/aaai/KurokawaLP13"}, "url":"URL#4071908" }, { "@score":"1", "@id":"4071909", "info":{"authors":{"author":[{"@pid":"k/ShayKutten","text":"Shay Kutten"},{"@pid":"16/1346","text":"Ron Lavi"},{"@pid":"68/3831","text":"Amitabh Trehan"}]},"title":"Composition Games for Distributed Systems: The EU Grant Games.","venue":"AAAI","pages":"562-568","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KuttenLT13","doi":"10.1609/AAAI.V27I1.8636","ee":"https://doi.org/10.1609/aaai.v27i1.8636","url":"https://dblp.org/rec/conf/aaai/KuttenLT13"}, "url":"URL#4071909" }, { "@score":"1", "@id":"4071910", "info":{"authors":{"author":[{"@pid":"92/5526","text":"Branislav Kveton"},{"@pid":"90/508","text":"Georgios Theocharous"}]},"title":"Structured Kernel-Based Reinforcement Learning.","venue":"AAAI","pages":"569-575","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KvetonT13","doi":"10.1609/AAAI.V27I1.8669","ee":"https://doi.org/10.1609/aaai.v27i1.8669","url":"https://dblp.org/rec/conf/aaai/KvetonT13"}, "url":"URL#4071910" }, { "@score":"1", "@id":"4071911", "info":{"authors":{"author":[{"@pid":"133/1682","text":"Irene Kwok"},{"@pid":"48/7949","text":"Yuzhou Wang"}]},"title":"Locate the Hate: Detecting Tweets against Blacks.","venue":"AAAI","pages":"1621-1622","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/KwokW13","doi":"10.1609/AAAI.V27I1.8539","ee":"https://doi.org/10.1609/aaai.v27i1.8539","url":"https://dblp.org/rec/conf/aaai/KwokW13"}, "url":"URL#4071911" }, { "@score":"1", "@id":"4071912", "info":{"authors":{"author":{"@pid":"04/10300","text":"Walter Stephen Lasecki"}},"title":"Crowdsourcing for Deployable Intelligent Systems.","venue":"AAAI","pages":"1670-1671","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Lasecki13","doi":"10.1609/AAAI.V27I1.8507","ee":"https://doi.org/10.1609/aaai.v27i1.8507","url":"https://dblp.org/rec/conf/aaai/Lasecki13"}, "url":"URL#4071912" }, { "@score":"1", "@id":"4071913", "info":{"authors":{"author":[{"@pid":"04/10300","text":"Walter Stephen Lasecki"},{"@pid":"133/1763","text":"Leon Weingard"},{"@pid":"83/6818","text":"Jeffrey Philip Bigham"},{"@pid":"93/3815","text":"George Ferguson"}]},"title":"Crowd Formalization of Action Conditions.","venue":"AAAI","pages":"1623-1624","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LaseckiWBF13","doi":"10.1609/AAAI.V27I1.8538","ee":"https://doi.org/10.1609/aaai.v27i1.8538","url":"https://dblp.org/rec/conf/aaai/LaseckiWBF13"}, "url":"URL#4071913" }, { "@score":"1", "@id":"4071914", "info":{"authors":{"author":[{"@pid":"95/2777","text":"Christophe Lecoutre"},{"@pid":"63/8396","text":"Anastasia Paparrizou"},{"@pid":"97/3237","text":"Kostas Stergiou 0001"}]},"title":"Extending STR to a Higher-Order Consistency.","venue":"AAAI","pages":"576-582","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LecoutrePS13","doi":"10.1609/AAAI.V27I1.8622","ee":"https://doi.org/10.1609/aaai.v27i1.8622","url":"https://dblp.org/rec/conf/aaai/LecoutrePS13"}, "url":"URL#4071914" }, { "@score":"1", "@id":"4071915", "info":{"authors":{"author":[{"@pid":"20/1133","text":"Sanghack Lee"},{"@pid":"h/VasantHonavar","text":"Vasant G. Honavar"}]},"title":"m-Transportability: Transportability of a Causal Effect from Multiple Environments.","venue":"AAAI","pages":"583-590","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LeeH13","doi":"10.1609/AAAI.V27I1.8596","ee":"https://doi.org/10.1609/aaai.v27i1.8596","url":"https://dblp.org/rec/conf/aaai/LeeH13"}, "url":"URL#4071915" }, { "@score":"1", "@id":"4071916", "info":{"authors":{"author":[{"@pid":"38/5896","text":"William Lee"},{"@pid":"93/1448","text":"Ramon Lawrence"}]},"title":"Trading Space for Time in Grid-Based Path Finding.","venue":"AAAI","pages":"1625-1626","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LeeL13","doi":"10.1609/AAAI.V27I1.8528","ee":"https://doi.org/10.1609/aaai.v27i1.8528","url":"https://dblp.org/rec/conf/aaai/LeeL13"}, "url":"URL#4071916" }, { "@score":"1", "@id":"4071918", "info":{"authors":{"author":[{"@pid":"05/5278","text":"Joshua Letchford"},{"@pid":"c/VincentConitzer","text":"Vincent Conitzer"}]},"title":"Solving Security Games on Graphs via Marginal Probabilities.","venue":"AAAI","pages":"591-597","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LetchfordC13","doi":"10.1609/AAAI.V27I1.8688","ee":"https://doi.org/10.1609/aaai.v27i1.8688","url":"https://dblp.org/rec/conf/aaai/LetchfordC13"}, "url":"URL#4071918" }, { "@score":"1", "@id":"4071921", "info":{"authors":{"author":[{"@pid":"117/5003","text":"Justin Li"},{"@pid":"l/JohnELaird","text":"John E. Laird"}]},"title":"Preemptive Strategies for Overcoming the Forgetting of Goals.","venue":"AAAI","pages":"1234-1240","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiL13","doi":"10.1609/AAAI.V27I1.8470","ee":"https://doi.org/10.1609/aaai.v27i1.8470","url":"https://dblp.org/rec/conf/aaai/LiL13"}, "url":"URL#4071921" }, { "@score":"1", "@id":"4071922", "info":{"authors":{"author":[{"@pid":"91/6174-5","text":"Hongbo Li 0005"},{"@pid":"77/175-1","text":"Yanchun Liang 0001"},{"@pid":"91/10056","text":"Jinsong Guo"},{"@pid":"04/9923","text":"Zhanshan Li"}]},"title":"Making Simple Tabular ReductionWorks on Negative Table Constraints.","venue":"AAAI","pages":"1629-1630","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiLGL13","doi":"10.1609/AAAI.V27I1.8519","ee":"https://doi.org/10.1609/aaai.v27i1.8519","url":"https://dblp.org/rec/conf/aaai/LiLGL13"}, "url":"URL#4071922" }, { "@score":"1", "@id":"4071923", "info":{"authors":{"author":[{"@pid":"70/1211-1","text":"Boyang Li 0001"},{"@pid":"00/4538","text":"Stephen Lee-Urban"},{"@pid":"133/1822","text":"George Johnston"},{"@pid":"r/MarkORiedl","text":"Mark O. Riedl"}]},"title":"Story Generation with Crowdsourced Plot Graphs.","venue":"AAAI","pages":"598-604","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiLJR13","doi":"10.1609/AAAI.V27I1.8649","ee":"https://doi.org/10.1609/aaai.v27i1.8649","url":"https://dblp.org/rec/conf/aaai/LiLJR13"}, "url":"URL#4071923" }, { "@score":"1", "@id":"4071924", "info":{"authors":{"author":[{"@pid":"83/6353-30","text":"Peng Li 0030"},{"@pid":"51/3710-5","text":"Yang Liu 0005"},{"@pid":"95/3291-1","text":"Maosong Sun 0001"}]},"title":"An Extended GHKM Algorithm for Inducing Lambda-SCFG.","venue":"AAAI","pages":"605-611","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiLS13","doi":"10.1609/AAAI.V27I1.8567","ee":"https://doi.org/10.1609/aaai.v27i1.8567","url":"https://dblp.org/rec/conf/aaai/LiLS13"}, "url":"URL#4071924" }, { "@score":"1", "@id":"4071925", "info":{"authors":{"author":[{"@pid":"06/8230","text":"Hai-Guang Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"181/2856-8","text":"Zhao Li 0008"},{"@pid":"59/622-3","text":"Wei Ding 0003"}]},"title":"Online Group Feature Selection from Feature Streams.","venue":"AAAI","pages":"1627-1628","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiWLD13","doi":"10.1609/AAAI.V27I1.8516","ee":"https://doi.org/10.1609/aaai.v27i1.8516","url":"https://dblp.org/rec/conf/aaai/LiWLD13"}, "url":"URL#4071925" }, { "@score":"1", "@id":"4071926", "info":{"authors":{"author":[{"@pid":"53/4014","text":"Xiaomei Li"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"63/6340","text":"Gong-Qing Wu"},{"@pid":"38/5910","text":"Xuegang Hu"}]},"title":"Subchloroplast Location Prediction via Homolog Knowledge Transfer and Feature Selection.","venue":"AAAI","pages":"1631-1632","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiWWH13","doi":"10.1609/AAAI.V27I1.8527","ee":"https://doi.org/10.1609/aaai.v27i1.8527","url":"https://dblp.org/rec/conf/aaai/LiWWH13"}, "url":"URL#4071926" }, { "@score":"1", "@id":"4071927", "info":{"authors":{"author":[{"@pid":"56/5830","text":"Guohua Liang"},{"@pid":"c/AnthonyGCohn","text":"Anthony G. Cohn 0001"}]},"title":"An Effective Approach for Imbalanced Classification: Unevenly Balanced Bagging.","venue":"AAAI","pages":"1633-1634","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiangC13","doi":"10.1609/AAAI.V27I1.8536","ee":"https://doi.org/10.1609/aaai.v27i1.8536","url":"https://dblp.org/rec/conf/aaai/LiangC13"}, "url":"URL#4071927" }, { "@score":"1", "@id":"4071929", "info":{"authors":{"author":{"@pid":"l/SebastianLink","text":"Sebastian Link"}},"title":"Reasoning about Saturated Conditional Independence Under Uncertainty: Axioms, Algorithms, and Levesque's Situations to the Rescue.","venue":"AAAI","pages":"612-618","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Link13","doi":"10.1609/AAAI.V27I1.8564","ee":"https://doi.org/10.1609/aaai.v27i1.8564","url":"https://dblp.org/rec/conf/aaai/Link13"}, "url":"URL#4071929" }, { "@score":"1", "@id":"4071931", "info":{"authors":{"author":[{"@pid":"55/7901-1","text":"Xianglong Liu 0001"},{"@pid":"15/1384","text":"Junfeng He"},{"@pid":"97/4071","text":"Bo Lang"}]},"title":"Reciprocal Hash Tables for Nearest Neighbor Search.","venue":"AAAI","pages":"626-632","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiuHL13","doi":"10.1609/AAAI.V27I1.8582","ee":"https://doi.org/10.1609/aaai.v27i1.8582","url":"https://dblp.org/rec/conf/aaai/LiuHL13"}, "url":"URL#4071931" }, { "@score":"1", "@id":"4071932", "info":{"authors":{"author":[{"@pid":"130/4645","text":"Dehua Liu"},{"@pid":"126/1751","text":"Bojun Tu"},{"@pid":"66/5293","text":"Hui Qian 0001"},{"@pid":"52/5331","text":"Zhihua Zhang"}]},"title":"Large-Scale Hierarchical Classification via Stochastic Perceptron.","venue":"AAAI","pages":"619-625","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LiuTQZ13","doi":"10.1609/AAAI.V27I1.8606","ee":"https://doi.org/10.1609/aaai.v27i1.8606","url":"https://dblp.org/rec/conf/aaai/LiuTQZ13"}, "url":"URL#4071932" }, { "@score":"1", "@id":"4071933", "info":{"authors":{"author":[{"@pid":"133/1694","text":"Yen-Cheng Lu"},{"@pid":"21/3047-1","text":"Feng Chen 0001"},{"@pid":"48/4792","text":"Yang Chen"},{"@pid":"08/4367","text":"Chang-Tien Lu"}]},"title":"A Generalized Student-t Based Approach to Mixed-Type Anomaly Detection.","venue":"AAAI","pages":"633-639","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LuCCL13","doi":"10.1609/AAAI.V27I1.8581","ee":"https://doi.org/10.1609/aaai.v27i1.8581","url":"https://dblp.org/rec/conf/aaai/LuCCL13"}, "url":"URL#4071933" }, { "@score":"1", "@id":"4071935", "info":{"authors":{"author":[{"@pid":"53/5234","text":"Zhiwu Lu 0001"},{"@pid":"13/3073","text":"Yuxin Peng"}]},"title":"Unified Constraint Propagation on Multi-View Data.","venue":"AAAI","pages":"640-646","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LuP13","doi":"10.1609/AAAI.V27I1.8638","ee":"https://doi.org/10.1609/aaai.v27i1.8638","url":"https://dblp.org/rec/conf/aaai/LuP13"}, "url":"URL#4071935" }, { "@score":"1", "@id":"4071936", "info":{"authors":{"author":[{"@pid":"57/5272-2","text":"Yong Luo 0002"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"97/2966-2","text":"Chang Xu 0002"},{"@pid":"133/1759","text":"Dongchen Li"},{"@pid":"79/1442-6","text":"Chao Xu 0006"}]},"title":"Vector-Valued Multi-View Semi-Supervsed Learning for Multi-Label Image Classification.","venue":"AAAI","pages":"647-653","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/LuoTXLX13","doi":"10.1609/AAAI.V27I1.8589","ee":"https://doi.org/10.1609/aaai.v27i1.8589","url":"https://dblp.org/rec/conf/aaai/LuoTXLX13"}, "url":"URL#4071936" }, { "@score":"1", "@id":"4071937", "info":{"authors":{"author":[{"@pid":"97/3847","text":"Sridhar Mahadevan"},{"@pid":"14/8174","text":"Stephen Giguere 0001"},{"@pid":"133/1846","text":"Nicholas Jacek"}]},"title":"Basis Adaptation for Sparse Nonlinear Reinforcement Learning.","venue":"AAAI","pages":"654-660","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MahadevanGJ13","doi":"10.1609/AAAI.V27I1.8665","ee":"https://doi.org/10.1609/aaai.v27i1.8665","url":"https://dblp.org/rec/conf/aaai/MahadevanGJ13"}, "url":"URL#4071937" }, { "@score":"1", "@id":"4071939", "info":{"authors":{"author":[{"@pid":"29/3105","text":"Mehdi Hafezi Manshadi"},{"@pid":"51/844","text":"Daniel Gildea"},{"@pid":"a/JFAllen","text":"James F. Allen"}]},"title":"Integrating Programming by Example and Natural Language Programming.","venue":"AAAI","pages":"661-667","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ManshadiGA13","doi":"10.1609/AAAI.V27I1.8695","ee":"https://doi.org/10.1609/aaai.v27i1.8695","url":"https://dblp.org/rec/conf/aaai/ManshadiGA13"}, "url":"URL#4071939" }, { "@score":"1", "@id":"4071940", "info":{"authors":{"author":[{"@pid":"71/10037","text":"Andrew Mao"},{"@pid":"p/ArielDProcaccia","text":"Ariel D. Procaccia"},{"@pid":"72/3762-1","text":"Yiling Chen 0001"}]},"title":"Better Human Computation Through Principled Voting.","venue":"AAAI","pages":"1142-1148","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MaoPC13","doi":"10.1609/AAAI.V27I1.8460","ee":"https://doi.org/10.1609/aaai.v27i1.8460","url":"https://dblp.org/rec/conf/aaai/MaoPC13"}, "url":"URL#4071940" }, { "@score":"1", "@id":"4071941", "info":{"authors":{"author":[{"@pid":"116/5622","text":"Alberto Maran"},{"@pid":"93/1858","text":"Nicolas Maudet"},{"@pid":"97/6092","text":"Maria Silvia Pini"},{"@pid":"r/FrancescaRossi","text":"Francesca Rossi 0001"},{"@pid":"v/KristenBrentVenable","text":"Kristen Brent Venable"}]},"title":"A Framework for Aggregating Influenced CP-Nets and its Resistance to Bribery.","venue":"AAAI","pages":"668-674","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MaranMPRV13","doi":"10.1609/AAAI.V27I1.8639","ee":"https://doi.org/10.1609/aaai.v27i1.8639","url":"https://dblp.org/rec/conf/aaai/MaranMPRV13"}, "url":"URL#4071941" }, { "@score":"1", "@id":"4071944", "info":{"authors":{"author":[{"@pid":"94/8181","text":"Parisa Mazrooei"},{"@pid":"42/7118","text":"Christopher Archibald"},{"@pid":"71/5161","text":"Michael Bowling"}]},"title":"Automating Collusion Detection in Sequential Games.","venue":"AAAI","pages":"675-682","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MazrooeiAB13","doi":"10.1609/AAAI.V27I1.8674","ee":"https://doi.org/10.1609/aaai.v27i1.8674","url":"https://dblp.org/rec/conf/aaai/MazrooeiAB13"}, "url":"URL#4071944" }, { "@score":"1", "@id":"4071947", "info":{"authors":{"author":[{"@pid":"24/5865","text":"Reshef Meir"},{"@pid":"77/2582","text":"Tyler Lu"},{"@pid":"t/MosheTennenholtz","text":"Moshe Tennenholtz"},{"@pid":"10/3411","text":"Craig Boutilier"}]},"title":"On the Value of Using Group Discounts under Price Competition.","venue":"AAAI","pages":"683-689","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MeirLTB13","doi":"10.1609/AAAI.V27I1.8641","ee":"https://doi.org/10.1609/aaai.v27i1.8641","url":"https://dblp.org/rec/conf/aaai/MeirLTB13"}, "url":"URL#4071947" }, { "@score":"1", "@id":"4071948", "info":{"authors":{"author":[{"@pid":"24/5865","text":"Reshef Meir"},{"@pid":"90/9924","text":"Yair Zick"},{"@pid":"31/2621","text":"Edith Elkind"},{"@pid":"r/JeffreySRosenschein","text":"Jeffrey S. Rosenschein"}]},"title":"Bounding the Cost of Stability in Games over Interaction Networks.","venue":"AAAI","pages":"690-696","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MeirZER13","doi":"10.1609/AAAI.V27I1.8613","ee":"https://doi.org/10.1609/aaai.v27i1.8613","url":"https://dblp.org/rec/conf/aaai/MeirZER13"}, "url":"URL#4071948" }, { "@score":"1", "@id":"4071949", "info":{"authors":{"author":{"@pid":"86/1747","text":"Gerard de Melo"}},"title":"Not Quite the Same: Identity Constraints for the Web of Linked Data.","venue":"AAAI","pages":"1092-1098","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Melo13","doi":"10.1609/AAAI.V27I1.8468","ee":"https://doi.org/10.1609/aaai.v27i1.8468","url":"https://dblp.org/rec/conf/aaai/Melo13"}, "url":"URL#4071949" }, { "@score":"1", "@id":"4071950", "info":{"authors":{"author":[{"@pid":"81/9882","text":"Mariana Recamonde Mendoza"},{"@pid":"b/AnaLCBazzan","text":"Ana Lúcia C. Bazzan"}]},"title":"The Wisdom of Crowds in Bioinformatics: What Can We Learn (and Gain) from Ensemble Predictions?","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MendozaB13","doi":"10.1609/AAAI.V27I1.1678-1679","ee":"https://doi.org/10.1609/aaai.v27i1.1678-1679","url":"https://dblp.org/rec/conf/aaai/MendozaB13"}, "url":"URL#4071950" }, { "@score":"1", "@id":"4071951", "info":{"authors":{"author":[{"@pid":"10/985","text":"Felipe Meneguzzi"},{"@pid":"14/7263","text":"Pankaj R. Telang"},{"@pid":"s/MunindarPSingh","text":"Munindar P. Singh"}]},"title":"A First-Order Formalization of Commitments and Goals for Planning.","venue":"AAAI","pages":"697-703","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MeneguzziTS13","doi":"10.1609/AAAI.V27I1.8632","ee":"https://doi.org/10.1609/aaai.v27i1.8632","url":"https://dblp.org/rec/conf/aaai/MeneguzziTS13"}, "url":"URL#4071951" }, { "@score":"1", "@id":"4071952", "info":{"authors":{"author":[{"@pid":"22/5614","text":"Deyu Meng"},{"@pid":"25/3264","text":"Zongben Xu"},{"@pid":"64/5666-6","text":"Lei Zhang 0006"},{"@pid":"70/3758-1","text":"Ji Zhao 0001"}]},"title":"A Cyclic Weighted Median Method for L1 Low-Rank Matrix Factorization with Missing Entries.","venue":"AAAI","pages":"704-710","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MengXZZ13","doi":"10.1609/AAAI.V27I1.8562","ee":"https://doi.org/10.1609/aaai.v27i1.8562","url":"https://dblp.org/rec/conf/aaai/MengXZZ13"}, "url":"URL#4071952" }, { "@score":"1", "@id":"4071953", "info":{"authors":{"author":[{"@pid":"22/11107","text":"João Vicente Messias"},{"@pid":"27/6431","text":"Matthijs T. J. Spaan"},{"@pid":"24/2178","text":"Pedro U. Lima"}]},"title":"GSMDPs for Multi-Robot Sequential Decision-Making.","venue":"AAAI","pages":"1408-1414","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MessiasSL13","doi":"10.1609/AAAI.V27I1.8550","ee":"https://doi.org/10.1609/aaai.v27i1.8550","url":"https://dblp.org/rec/conf/aaai/MessiasSL13"}, "url":"URL#4071953" }, { "@score":"1", "@id":"4071957", "info":{"authors":{"author":[{"@pid":"77/7405","text":"Mitra Mohtarami"},{"@pid":"01/800","text":"Man Lan"},{"@pid":"t/ChewLimTan","text":"Chew Lim Tan"}]},"title":"From Semantic to Emotional Space in Probabilistic Sense Sentiment Analysis.","venue":"AAAI","pages":"711-717","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/MohtaramiLT13","doi":"10.1609/AAAI.V27I1.8699","ee":"https://doi.org/10.1609/aaai.v27i1.8699","url":"https://dblp.org/rec/conf/aaai/MohtaramiLT13"}, "url":"URL#4071957" }, { "@score":"1", "@id":"4071960", "info":{"authors":{"author":[{"@pid":"m/HectorMunozAvila","text":"Hector Muñoz-Avila"},{"@pid":"18/5439","text":"David J. Stracuzzi"}]},"title":"IAAI-13 Preface.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Munoz-AvilaS13","doi":"10.1609/AAAI.V27I1.8513","ee":"https://doi.org/10.1609/aaai.v27i1.8513","url":"https://dblp.org/rec/conf/aaai/Munoz-AvilaS13"}, "url":"URL#4071960" }, { "@score":"1", "@id":"4071964", "info":{"authors":{"author":[{"@pid":"117/4935","text":"Thanh Hong Nguyen"},{"@pid":"53/4040","text":"Rong Yang"},{"@pid":"18/9923","text":"Amos Azaria"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"},{"@pid":"67/2667","text":"Milind Tambe"}]},"title":"Analyzing the Effectiveness of Adversary Modeling in Security Games.","venue":"AAAI","pages":"718-724","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/NguyenYAKT13","doi":"10.1609/AAAI.V27I1.8599","ee":"https://doi.org/10.1609/aaai.v27i1.8599","url":"https://dblp.org/rec/conf/aaai/NguyenYAKT13"}, "url":"URL#4071964" }, { "@score":"1", "@id":"4071965", "info":{"authors":{"author":{"@pid":"n/MathiasNiepert","text":"Mathias Niepert"}},"title":"Symmetry-Aware Marginal Density Estimation.","venue":"AAAI","pages":"725-731","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Niepert13","doi":"10.1609/AAAI.V27I1.8621","ee":"https://doi.org/10.1609/aaai.v27i1.8621","url":"https://dblp.org/rec/conf/aaai/Niepert13"}, "url":"URL#4071965" }, { "@score":"1", "@id":"4071966", "info":{"authors":{"author":[{"@pid":"59/8524","text":"Raz Nissim"},{"@pid":"b/RonenIBrafman","text":"Ronen I. Brafman"}]},"title":"Cost-Optimal Planning by Self-Interested Agents.","venue":"AAAI","pages":"732-738","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/NissimB13","doi":"10.1609/AAAI.V27I1.8640","ee":"https://doi.org/10.1609/aaai.v27i1.8640","url":"https://dblp.org/rec/conf/aaai/NissimB13"}, "url":"URL#4071966" }, { "@score":"1", "@id":"4071967", "info":{"authors":{"author":[{"@pid":"76/8176","text":"Jan Noessner"},{"@pid":"n/MathiasNiepert","text":"Mathias Niepert"},{"@pid":"50/5895","text":"Heiner Stuckenschmidt"}]},"title":"RockIt: Exploiting Parallelism and Symmetry for MAP Inference in Statistical Relational Models.","venue":"AAAI","pages":"739-745","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/NoessnerNS13","doi":"10.1609/AAAI.V27I1.8579","ee":"https://doi.org/10.1609/aaai.v27i1.8579","url":"https://dblp.org/rec/conf/aaai/NoessnerNS13"}, "url":"URL#4071967" }, { "@score":"1", "@id":"4071970", "info":{"authors":{"author":[{"@pid":"133/1704","text":"Hui Meen Nyew"},{"@pid":"40/6734","text":"Nilufer Onder"},{"@pid":"79/6333","text":"Soner Önder"},{"@pid":"88/5294","text":"Zhenlin Wang"}]},"title":"A First-Order Logic Based Framework for Verifying Simulations.","venue":"AAAI","pages":"1635-1636","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/NyewOOW13","doi":"10.1609/AAAI.V27I1.8540","ee":"https://doi.org/10.1609/aaai.v27i1.8540","url":"https://dblp.org/rec/conf/aaai/NyewOOW13"}, "url":"URL#4071970" }, { "@score":"1", "@id":"4071972", "info":{"authors":{"author":[{"@pid":"39/3058","text":"Sylvie C. W. Ong"},{"@pid":"53/11349","text":"Yuri Grinberg"},{"@pid":"p/JoellePineau","text":"Joelle Pineau"}]},"title":"Mixed Observability Predictive State Representations.","venue":"AAAI","pages":"746-752","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/OngGP13","doi":"10.1609/AAAI.V27I1.8680","ee":"https://doi.org/10.1609/aaai.v27i1.8680","url":"https://dblp.org/rec/conf/aaai/OngGP13"}, "url":"URL#4071972" }, { "@score":"1", "@id":"4071973", "info":{"authors":{"author":[{"@pid":"70/7564","text":"Aditya Pal"},{"@pid":"03/6610","text":"Nilesh N. Dalvi"},{"@pid":"42/5376","text":"Kedar Bellare"}]},"title":"Discovering Hierarchical Structure for Sources and Entities.","venue":"AAAI","pages":"753-759","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PalDB13","doi":"10.1609/AAAI.V27I1.8625","ee":"https://doi.org/10.1609/aaai.v27i1.8625","url":"https://dblp.org/rec/conf/aaai/PalDB13"}, "url":"URL#4071973" }, { "@score":"1", "@id":"4071974", "info":{"authors":{"author":[{"@pid":"88/3327","text":"Yan Pan"},{"@pid":"31/9937","text":"Hanjiang Lai"},{"@pid":"95/6404-1","text":"Cong Liu 0001"},{"@pid":"01/2880","text":"Yong Tang"},{"@pid":"y/ShuichengYan","text":"Shuicheng Yan"}]},"title":"Rank Aggregation via Low-Rank and Structured-Sparse Decomposition.","venue":"AAAI","pages":"760-766","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PanLLTY13","doi":"10.1609/AAAI.V27I1.8556","ee":"https://doi.org/10.1609/aaai.v27i1.8556","url":"https://dblp.org/rec/conf/aaai/PanLLTY13"}, "url":"URL#4071974" }, { "@score":"1", "@id":"4071975", "info":{"authors":{"author":{"@pid":"00/1170","text":"Alessandro Panella"}},"title":"Multiagent Stochastic Planning With Bayesian Policy Recognition.","venue":"AAAI","pages":"1672-1673","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Panella13","doi":"10.1609/AAAI.V27I1.8506","ee":"https://doi.org/10.1609/aaai.v27i1.8506","url":"https://dblp.org/rec/conf/aaai/Panella13"}, "url":"URL#4071975" }, { "@score":"1", "@id":"4071977", "info":{"authors":{"author":{"@pid":"63/8396","text":"Anastasia Paparrizou"}},"title":"Efficient Algorithms for Strong Local Consistencies in Constraint Satisfaction Problems.","venue":"AAAI","pages":"1674-1675","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Paparrizou13","doi":"10.1609/AAAI.V27I1.8504","ee":"https://doi.org/10.1609/aaai.v27i1.8504","url":"https://dblp.org/rec/conf/aaai/Paparrizou13"}, "url":"URL#4071977" }, { "@score":"1", "@id":"4071978", "info":{"authors":{"author":[{"@pid":"p/DavidCParkes","text":"David C. Parkes"},{"@pid":"p/ArielDProcaccia","text":"Ariel D. Procaccia"}]},"title":"Dynamic Social Choice with Evolving Preferences.","venue":"AAAI","pages":"767-773","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ParkesP13","doi":"10.1609/AAAI.V27I1.8570","ee":"https://doi.org/10.1609/aaai.v27i1.8570","url":"https://dblp.org/rec/conf/aaai/ParkesP13"}, "url":"URL#4071978" }, { "@score":"1", "@id":"4071980", "info":{"authors":{"author":[{"@pid":"88/7057","text":"Jason Pazis"},{"@pid":"26/4670","text":"Ronald Parr"}]},"title":"PAC Optimal Exploration in Continuous Space Markov Decision Processes.","venue":"AAAI","pages":"774-781","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PazisP13","doi":"10.1609/AAAI.V27I1.8678","ee":"https://doi.org/10.1609/aaai.v27i1.8678","url":"https://dblp.org/rec/conf/aaai/PazisP13"}, "url":"URL#4071980" }, { "@score":"1", "@id":"4071981", "info":{"authors":{"author":[{"@pid":"88/7057","text":"Jason Pazis"},{"@pid":"26/4670","text":"Ronald Parr"}]},"title":"Sample Complexity and Performance Bounds for Non-Parametric Approximate Linear Programming.","venue":"AAAI","pages":"782-788","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PazisP13a","doi":"10.1609/AAAI.V27I1.8696","ee":"https://doi.org/10.1609/aaai.v27i1.8696","url":"https://dblp.org/rec/conf/aaai/PazisP13a"}, "url":"URL#4071981" }, { "@score":"1", "@id":"4071983", "info":{"authors":{"author":[{"@pid":"26/10481","text":"Noam Peled"},{"@pid":"65/3114","text":"Ya'akov (Kobi) Gal"},{"@pid":"k/SaritKraus","text":"Sarit Kraus"}]},"title":"An Agent Design for Repeated Negotiation and Information Revelation with People.","venue":"AAAI","pages":"789-795","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PeledGK13","doi":"10.1609/AAAI.V27I1.8619","ee":"https://doi.org/10.1609/aaai.v27i1.8619","url":"https://dblp.org/rec/conf/aaai/PeledGK13"}, "url":"URL#4071983" }, { "@score":"1", "@id":"4071984", "info":{"authors":{"author":[{"@pid":"133/1706","text":"Houwen Peng"},{"@pid":"13/2692-1","text":"Bing Li 0001"},{"@pid":"86/5681","text":"Rongrong Ji"},{"@pid":"41/6824","text":"Weiming Hu"},{"@pid":"x/WeihuaXiong","text":"Weihua Xiong"},{"@pid":"89/4275","text":"Congyan Lang"}]},"title":"Salient Object Detection via Low-Rank and Structured Sparse Matrix Decomposition.","venue":"AAAI","pages":"796-802","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PengLJHXL13","doi":"10.1609/AAAI.V27I1.8591","ee":"https://doi.org/10.1609/aaai.v27i1.8591","url":"https://dblp.org/rec/conf/aaai/PengLJHXL13"}, "url":"URL#4071984" }, { "@score":"1", "@id":"4071985", "info":{"authors":{"author":[{"@pid":"12/9717","text":"Ian Perera"},{"@pid":"a/JFAllen","text":"James F. Allen"}]},"title":"SALL-E: Situated Agent for Language Learning.","venue":"AAAI","pages":"1241-1247","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PereraA13","doi":"10.1609/AAAI.V27I1.8475","ee":"https://doi.org/10.1609/aaai.v27i1.8475","url":"https://dblp.org/rec/conf/aaai/PereraA13"}, "url":"URL#4071985" }, { "@score":"1", "@id":"4071990", "info":{"authors":{"author":[{"@pid":"97/6092","text":"Maria Silvia Pini"},{"@pid":"r/FrancescaRossi","text":"Francesca Rossi 0001"},{"@pid":"v/KristenBrentVenable","text":"Kristen Brent Venable"}]},"title":"Bribery in Voting With Soft Constraints.","venue":"AAAI","pages":"803-809","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PiniRV13","doi":"10.1609/AAAI.V27I1.8586","ee":"https://doi.org/10.1609/aaai.v27i1.8586","url":"https://dblp.org/rec/conf/aaai/PiniRV13"}, "url":"URL#4071990" }, { "@score":"1", "@id":"4071991", "info":{"authors":{"author":{"@pid":"56/1461","text":"Erion Plaku"}},"title":"Robot Motion Planning with Dynamics as Hybrid Search.","venue":"AAAI","pages":"1415-1421","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Plaku13","doi":"10.1609/AAAI.V27I1.8544","ee":"https://doi.org/10.1609/aaai.v27i1.8544","url":"https://dblp.org/rec/conf/aaai/Plaku13"}, "url":"URL#4071991" }, { "@score":"1", "@id":"4071994", "info":{"authors":{"author":[{"@pid":"15/2876","text":"Denis K. Ponomaryov"},{"@pid":"79/906","text":"Mikhail Soutchanski"}]},"title":"Progression of Decomposed Situation Calculus Theories.","venue":"AAAI","pages":"810-817","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PonomaryovS13","doi":"10.1609/AAAI.V27I1.8612","ee":"https://doi.org/10.1609/aaai.v27i1.8612","url":"https://dblp.org/rec/conf/aaai/PonomaryovS13"}, "url":"URL#4071994" }, { "@score":"1", "@id":"4071996", "info":{"authors":{"author":[{"@pid":"29/9729","text":"Alessandro Previti"},{"@pid":"340/6684-1","text":"João Marques-Silva 0001"}]},"title":"Partial MUS Enumeration.","venue":"AAAI","pages":"818-825","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/PrevitiM13","doi":"10.1609/AAAI.V27I1.8657","ee":"https://doi.org/10.1609/aaai.v27i1.8657","url":"https://dblp.org/rec/conf/aaai/PrevitiM13"}, "url":"URL#4071996" }, { "@score":"1", "@id":"4071997", "info":{"authors":{"author":[{"@pid":"20/135","text":"Scott Proper"},{"@pid":"22/378","text":"Kagan Tumer"}]},"title":"Multiagent Learning with a Noisy Global Reward Signal.","venue":"AAAI","pages":"826-832","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ProperT13","doi":"10.1609/AAAI.V27I1.8580","ee":"https://doi.org/10.1609/aaai.v27i1.8580","url":"https://dblp.org/rec/conf/aaai/ProperT13"}, "url":"URL#4071997" }, { "@score":"1", "@id":"4071999", "info":{"authors":{"author":[{"@pid":"133/1771","text":"Goran Radanovic"},{"@pid":"f/BoiFaltings","text":"Boi Faltings"}]},"title":"A Robust Bayesian Truth Serum for Non-Binary Signals.","venue":"AAAI","pages":"833-839","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RadanovicF13","doi":"10.1609/AAAI.V27I1.8677","ee":"https://doi.org/10.1609/aaai.v27i1.8677","url":"https://dblp.org/rec/conf/aaai/RadanovicF13"}, "url":"URL#4071999" }, { "@score":"1", "@id":"4072002", "info":{"authors":{"author":{"@pid":"83/10555","text":"Adrian Ratter"}},"title":"Optimization of Heterogeneous Computing Resources for Robotic Mapping.","venue":"AAAI","pages":"1676-1677","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Ratter13","doi":"10.1609/AAAI.V27I1.8494","ee":"https://doi.org/10.1609/aaai.v27i1.8494","url":"https://dblp.org/rec/conf/aaai/Ratter13"}, "url":"URL#4072002" }, { "@score":"1", "@id":"4072004", "info":{"authors":{"author":[{"@pid":"21/9922","text":"Prashant P. Reddy"},{"@pid":"v/ManuelaMVeloso","text":"Manuela M. Veloso"}]},"title":"Negotiated Learning for Smart Grid Agents: Entity Selection based on Dynamic Partially Observable Features.","venue":"AAAI","pages":"1313-1319","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ReddyV13","doi":"10.1609/AAAI.V27I1.8481","ee":"https://doi.org/10.1609/aaai.v27i1.8481","url":"https://dblp.org/rec/conf/aaai/ReddyV13"}, "url":"URL#4072004" }, { "@score":"1", "@id":"4072005", "info":{"authors":{"author":[{"@pid":"43/9044","text":"Jimmy S. J. Ren"},{"@pid":"35/7092-65","text":"Wei Wang 0065"},{"@pid":"98/7308-21","text":"Jiawei Wang 0021"},{"@pid":"53/3715","text":"Stephen S. Y. Liao"}]},"title":"Exploring the Contribution of Unlabeled Data in Financial Sentiment Analysis.","venue":"AAAI","pages":"1149-1155","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RenWWL13","doi":"10.1609/AAAI.V27I1.8459","ee":"https://doi.org/10.1609/aaai.v27i1.8459","url":"https://dblp.org/rec/conf/aaai/RenWWL13"}, "url":"URL#4072005" }, { "@score":"1", "@id":"4072006", "info":{"authors":{"author":[{"@pid":"39/8393","text":"Kosta Ristovski"},{"@pid":"17/1226","text":"Vladan Radosavljevic"},{"@pid":"13/5776","text":"Slobodan Vucetic"},{"@pid":"92/1944","text":"Zoran Obradovic"}]},"title":"Continuous Conditional Random Fields for Efficient Regression in Large Fully Connected Graphs.","venue":"AAAI","pages":"840-846","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RistovskiRVO13","doi":"10.1609/AAAI.V27I1.8685","ee":"https://doi.org/10.1609/aaai.v27i1.8685","url":"https://dblp.org/rec/conf/aaai/RistovskiRVO13"}, "url":"URL#4072006" }, { "@score":"1", "@id":"4072007", "info":{"authors":{"author":[{"@pid":"75/10716","text":"Igor Rochlin"},{"@pid":"03/5237","text":"David Sarne"}]},"title":"Information Sharing Under Costly Communication in Joint Exploration.","venue":"AAAI","pages":"847-853","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RochlinS13","doi":"10.1609/AAAI.V27I1.8574","ee":"https://doi.org/10.1609/aaai.v27i1.8574","url":"https://dblp.org/rec/conf/aaai/RochlinS13"}, "url":"URL#4072007" }, { "@score":"1", "@id":"4072011", "info":{"authors":{"author":[{"@pid":"56/2284","text":"Pierre Roy"},{"@pid":"48/124","text":"François Pachet"}]},"title":"Enforcing Meter in Finite-Length Markov Sequences.","venue":"AAAI","pages":"854-861","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RoyP13","doi":"10.1609/AAAI.V27I1.8661","ee":"https://doi.org/10.1609/aaai.v27i1.8661","url":"https://dblp.org/rec/conf/aaai/RoyP13"}, "url":"URL#4072011" }, { "@score":"1", "@id":"4072012", "info":{"authors":{"author":[{"@pid":"10/9515","text":"Leonel Dario Rozo"},{"@pid":"59/6334","text":"Sylvain Calinon"},{"@pid":"75/287","text":"Darwin G. Caldwell"},{"@pid":"51/2869","text":"Pablo Jiménez"},{"@pid":"t/CarmeTorras","text":"Carme Torras"}]},"title":"Learning Collaborative Impedance-Based Robot Behaviors.","venue":"AAAI","pages":"1422-1428","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RozoCCJT13","doi":"10.1609/AAAI.V27I1.8543","ee":"https://doi.org/10.1609/aaai.v27i1.8543","url":"https://dblp.org/rec/conf/aaai/RozoCCJT13"}, "url":"URL#4072012" }, { "@score":"1", "@id":"4072013", "info":{"authors":{"author":[{"@pid":"16/7622","text":"Michael Ruhnke"},{"@pid":"17/6808","text":"Liefeng Bo"},{"@pid":"f/DieterFox","text":"Dieter Fox"},{"@pid":"b/WolframBurgard","text":"Wolfram Burgard"}]},"title":"Compact RGBD Surface Models Based on Sparse Coding.","venue":"AAAI","pages":"1429-1435","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RuhnkeBFB13","doi":"10.1609/AAAI.V27I1.8549","ee":"https://doi.org/10.1609/aaai.v27i1.8549","url":"https://dblp.org/rec/conf/aaai/RuhnkeBFB13"}, "url":"URL#4072013" }, { "@score":"1", "@id":"4072014", "info":{"authors":{"author":[{"@pid":"09/6117","text":"Paul Ruvolo"},{"@pid":"22/2336","text":"Eric Eaton"}]},"title":"Active Task Selection for Lifelong Machine Learning.","venue":"AAAI","pages":"862-868","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/RuvoloE13","doi":"10.1609/AAAI.V27I1.8684","ee":"https://doi.org/10.1609/aaai.v27i1.8684","url":"https://dblp.org/rec/conf/aaai/RuvoloE13"}, "url":"URL#4072014" }, { "@score":"1", "@id":"4072015", "info":{"authors":{"author":[{"@pid":"64/3227","text":"Régis Sabbadin"},{"@pid":"133/1766","text":"Anne-France Viet"}]},"title":"A Tractable Leader-Follower MDP Model for Animal Disease Management.","venue":"AAAI","pages":"1320-1326","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SabbadinV13","doi":"10.1609/AAAI.V27I1.8476","ee":"https://doi.org/10.1609/aaai.v27i1.8476","url":"https://dblp.org/rec/conf/aaai/SabbadinV13"}, "url":"URL#4072015" }, { "@score":"1", "@id":"4072017", "info":{"authors":{"author":[{"@pid":"84/3120","text":"Mahyar Salek"},{"@pid":"70/2671","text":"Yoram Bachrach"},{"@pid":"22/3458","text":"Peter B. Key"}]},"title":"Hotspotting - A Probabilistic Graphical Model For Image Object Localization Through Crowdsourcing.","venue":"AAAI","pages":"1156-1162","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SalekBK13","doi":"10.1609/AAAI.V27I1.8465","ee":"https://doi.org/10.1609/aaai.v27i1.8465","url":"https://dblp.org/rec/conf/aaai/SalekBK13"}, "url":"URL#4072017" }, { "@score":"1", "@id":"4072018", "info":{"authors":{"author":[{"@pid":"68/3471","text":"Mehdi Samadi"},{"@pid":"v/ManuelaMVeloso","text":"Manuela M. Veloso"},{"@pid":"b/ManuelBlum-2","text":"Manuel Blum 0002"}]},"title":"OpenEval: Web Information Query Evaluation.","venue":"AAAI","pages":"1163-1169","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SamadiVB13","doi":"10.1609/AAAI.V27I1.8467","ee":"https://doi.org/10.1609/aaai.v27i1.8467","url":"https://dblp.org/rec/conf/aaai/SamadiVB13"}, "url":"URL#4072018" }, { "@score":"1", "@id":"4072021", "info":{"authors":{"author":[{"@pid":"133/1839","text":"Yoshikuni Sato"},{"@pid":"29/456","text":"Makoto Miwa"},{"@pid":"38/5380","text":"Shogo Takeuchi"},{"@pid":"88/2266","text":"Daisuke Takahashi"}]},"title":"Optimizing Objective Function Parameters for Strength in Computer Game-Playing.","venue":"AAAI","pages":"869-875","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SatoMTT13","doi":"10.1609/AAAI.V27I1.8650","ee":"https://doi.org/10.1609/aaai.v27i1.8650","url":"https://dblp.org/rec/conf/aaai/SatoMTT13"}, "url":"URL#4072021" }, { "@score":"1", "@id":"4072022", "info":{"authors":{"author":{"@pid":"22/10073","text":"Daniel R. Schlegel"}},"title":"Concurrent Inference Graphs.","venue":"AAAI","pages":"1680-1681","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Schlegel13","doi":"10.1609/AAAI.V27I1.8496","ee":"https://doi.org/10.1609/aaai.v27i1.8496","url":"https://dblp.org/rec/conf/aaai/Schlegel13"}, "url":"URL#4072022" }, { "@score":"1", "@id":"4072023", "info":{"authors":{"author":[{"@pid":"22/10073","text":"Daniel R. Schlegel"},{"@pid":"s/StuartCShapiro","text":"Stuart C. Shapiro"}]},"title":"Concurrent Reasoning with Inference Graphs.","venue":"AAAI","pages":"1637-1638","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SchlegelS13","doi":"10.1609/AAAI.V27I1.8524","ee":"https://doi.org/10.1609/aaai.v27i1.8524","url":"https://dblp.org/rec/conf/aaai/SchlegelS13"}, "url":"URL#4072023" }, { "@score":"1", "@id":"4072027", "info":{"authors":{"author":[{"@pid":"133/1779","text":"Huijuan Shao"},{"@pid":"61/6132","text":"Manish Marwah"},{"@pid":"r/NarenRamakrishnan","text":"Naren Ramakrishnan"}]},"title":"A Temporal Motif Mining Approach to Unsupervised Energy Disaggregation: Applications to Residential and Commercial Buildings.","venue":"AAAI","pages":"1327-1333","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ShaoMR13","doi":"10.1609/AAAI.V27I1.8485","ee":"https://doi.org/10.1609/aaai.v27i1.8485","url":"https://dblp.org/rec/conf/aaai/ShaoMR13"}, "url":"URL#4072027" }, { "@score":"1", "@id":"4072028", "info":{"authors":{"author":[{"@pid":"137/8732","text":"Abhishek B. Sharma"},{"@pid":"f/KDForbus","text":"Kenneth D. Forbus"}]},"title":"Automatic Extraction of Efficient Axiom Sets from Large Knowledge Bases.","venue":"AAAI","pages":"1248-1254","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SharmaF13","doi":"10.1609/AAAI.V27I1.8472","ee":"https://doi.org/10.1609/aaai.v27i1.8472","url":"https://dblp.org/rec/conf/aaai/SharmaF13"}, "url":"URL#4072028" }, { "@score":"1", "@id":"4072029", "info":{"authors":{"author":[{"@pid":"137/8732","text":"Abhishek B. Sharma"},{"@pid":"f/KDForbus","text":"Kenneth D. Forbus"}]},"title":"Graph Traversal Methods for Reasoning in Large Knowledge-Based Systems.","venue":"AAAI","pages":"1255-1261","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SharmaF13a","doi":"10.1609/AAAI.V27I1.8473","ee":"https://doi.org/10.1609/aaai.v27i1.8473","url":"https://dblp.org/rec/conf/aaai/SharmaF13a"}, "url":"URL#4072029" }, { "@score":"1", "@id":"4072031", "info":{"authors":{"author":[{"@pid":"25/2664","text":"Swakkhar Shatabda"},{"@pid":"80/1228","text":"M. A. Hakim Newton"},{"@pid":"s/AbdulSattar","text":"Abdul Sattar 0001"}]},"title":"Mixed Heuristic Local Search for Protein Structure Prediction.","venue":"AAAI","pages":"876-882","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ShatabdaNS13","doi":"10.1609/AAAI.V27I1.8602","ee":"https://doi.org/10.1609/aaai.v27i1.8602","url":"https://dblp.org/rec/conf/aaai/ShatabdaNS13"}, "url":"URL#4072031" }, { "@score":"1", "@id":"4072032", "info":{"authors":{"author":[{"@pid":"25/2664","text":"Swakkhar Shatabda"},{"@pid":"80/1228","text":"M. A. Hakim Newton"},{"@pid":"s/AbdulSattar","text":"Abdul Sattar 0001"}]},"title":"Simplified Lattice Models for Protein Structure Prediction: How Good Are They?","venue":"AAAI","pages":"1639-1640","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ShatabdaNS13a","doi":"10.1609/AAAI.V27I1.8526","ee":"https://doi.org/10.1609/aaai.v27i1.8526","url":"https://dblp.org/rec/conf/aaai/ShatabdaNS13a"}, "url":"URL#4072032" }, { "@score":"1", "@id":"4072033", "info":{"authors":{"author":[{"@pid":"58/766","text":"Daniel Sheldon"},{"@pid":"43/9076","text":"Andrew Farnsworth"},{"@pid":"13/442","text":"Jed Irvine"},{"@pid":"133/1764","text":"Benjamin Van Doren"},{"@pid":"133/1818","text":"Kevin F. Webb"},{"@pid":"d/TGDietterich","text":"Thomas G. Dietterich"},{"@pid":"36/2102","text":"Steve Kelling"}]},"title":"Approximate Bayesian Inference for Reconstructing Velocities of Migrating Birds from Weather Radar.","venue":"AAAI","pages":"1334-1340","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SheldonFIDWDK13","doi":"10.1609/AAAI.V27I1.8486","ee":"https://doi.org/10.1609/aaai.v27i1.8486","url":"https://dblp.org/rec/conf/aaai/SheldonFIDWDK13"}, "url":"URL#4072033" }, { "@score":"1", "@id":"4072034", "info":{"authors":{"author":[{"@pid":"97/8184","text":"Hiroaki Shiokawa"},{"@pid":"02/2520","text":"Yasuhiro Fujiwara"},{"@pid":"19/3497","text":"Makoto Onizuka"}]},"title":"Fast Algorithm for Modularity-Based Graph Clustering.","venue":"AAAI","pages":"1170-1176","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ShiokawaFO13","doi":"10.1609/AAAI.V27I1.8455","ee":"https://doi.org/10.1609/aaai.v27i1.8455","url":"https://dblp.org/rec/conf/aaai/ShiokawaFO13"}, "url":"URL#4072034" }, { "@score":"1", "@id":"4072036", "info":{"authors":{"author":[{"@pid":"51/410","text":"Shirin Sohrabi"},{"@pid":"39/4681","text":"Octavian Udrea"},{"@pid":"80/5282","text":"Anton Riabov"}]},"title":"Hypothesis Exploration for Malware Detection Using Planning.","venue":"AAAI","pages":"883-889","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SohrabiUR13","doi":"10.1609/AAAI.V27I1.8552","ee":"https://doi.org/10.1609/aaai.v27i1.8552","url":"https://dblp.org/rec/conf/aaai/SohrabiUR13"}, "url":"URL#4072036" }, { "@score":"1", "@id":"4072039", "info":{"authors":{"author":[{"@pid":"76/4051-2","text":"Zhao Song 0002"},{"@pid":"133/1772","text":"Yuke Zhu"}]},"title":"Graphical Model-Based Learning in High Dimensional Feature Spaces.","venue":"AAAI","pages":"1641-1642","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SongZ13","doi":"10.1609/AAAI.V27I1.8533","ee":"https://doi.org/10.1609/aaai.v27i1.8533","url":"https://dblp.org/rec/conf/aaai/SongZ13"}, "url":"URL#4072039" }, { "@score":"1", "@id":"4072041", "info":{"authors":{"author":[{"@pid":"66/8007","text":"Giorgio Stefanoni"},{"@pid":"56/1508","text":"Boris Motik"},{"@pid":"h/IanHorrocks","text":"Ian Horrocks 0001"}]},"title":"Introducing Nominals to the Combined Query Answering Approaches for EL.","venue":"AAAI","pages":"1177-1183","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/StefanoniMH13","doi":"10.1609/AAAI.V27I1.8452","ee":"https://doi.org/10.1609/aaai.v27i1.8452","url":"https://dblp.org/rec/conf/aaai/StefanoniMH13"}, "url":"URL#4072041" }, { "@score":"1", "@id":"4072042", "info":{"authors":{"author":[{"@pid":"95/1348","text":"Roni Tzvi Stern"},{"@pid":"133/1824","text":"Liron Samama"},{"@pid":"13/3098","text":"Rami Puzis"},{"@pid":"117/4870","text":"Tal Beja"},{"@pid":"46/7442","text":"Zahy Bnaya"},{"@pid":"43/5063","text":"Ariel Felner"}]},"title":"TONIC: Target Oriented Network Intelligence Collection for the Social Web.","venue":"AAAI","pages":"1184-1190","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/SternSPBBF13","doi":"10.1609/AAAI.V27I1.8466","ee":"https://doi.org/10.1609/aaai.v27i1.8466","url":"https://dblp.org/rec/conf/aaai/SternSPBBF13"}, "url":"URL#4072042" }, { "@score":"1", "@id":"4072043", "info":{"authors":{"author":[{"@pid":"74/9877","text":"Sabine Storandt"},{"@pid":"f/StefanFunke","text":"Stefan Funke"}]},"title":"Enabling E-Mobility: Facility Location for Battery Loading Stations.","venue":"AAAI","pages":"1341-1347","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/StorandtF13","doi":"10.1609/AAAI.V27I1.8478","ee":"https://doi.org/10.1609/aaai.v27i1.8478","url":"https://dblp.org/rec/conf/aaai/StorandtF13"}, "url":"URL#4072043" }, { "@score":"1", "@id":"4072044", "info":{"authors":{"author":{"@pid":"123/2604","text":"Lauren M. Stuart"}},"title":"On a Noun-Driven Syntactic Paradigm.","venue":"AAAI","pages":"1643-1644","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Stuart13","doi":"10.1609/AAAI.V27I1.8518","ee":"https://doi.org/10.1609/aaai.v27i1.8518","url":"https://dblp.org/rec/conf/aaai/Stuart13"}, "url":"URL#4072044" }, { "@score":"1", "@id":"4072045", "info":{"authors":{"author":[{"@pid":"133/1816","text":"Alexander David Styler"},{"@pid":"34/2510","text":"Illah Reza Nourbakhsh"}]},"title":"Model Predictive Control with Uncertainty in Human Driven Systems.","venue":"AAAI","pages":"1348-1354","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/StylerN13","doi":"10.1609/AAAI.V27I1.8488","ee":"https://doi.org/10.1609/aaai.v27i1.8488","url":"https://dblp.org/rec/conf/aaai/StylerN13"}, "url":"URL#4072045" }, { "@score":"1", "@id":"4072047", "info":{"authors":{"author":[{"@pid":"132/1977","text":"Clifford A. Tawiah"},{"@pid":"36/4372","text":"Victor S. Sheng"}]},"title":"Empirical Comparison of Multi-Label Classification Algorithms.","venue":"AAAI","pages":"1645-1646","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/TawiahS13","doi":"10.1609/AAAI.V27I1.8521","ee":"https://doi.org/10.1609/aaai.v27i1.8521","url":"https://dblp.org/rec/conf/aaai/TawiahS13"}, "url":"URL#4072047" }, { "@score":"1", "@id":"4072048", "info":{"authors":{"author":{"@pid":"t/MichaelThielscher","text":"Michael Thielscher"}},"title":"Filtering With Logic Programs and Its Application to General Game Playing.","venue":"AAAI","pages":"890-896","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Thielscher13","doi":"10.1609/AAAI.V27I1.8595","ee":"https://doi.org/10.1609/aaai.v27i1.8595","url":"https://dblp.org/rec/conf/aaai/Thielscher13"}, "url":"URL#4072048" }, { "@score":"1", "@id":"4072051", "info":{"authors":{"author":[{"@pid":"133/1793","text":"Alan Tsang"},{"@pid":"27/3591","text":"Kate Larson"},{"@pid":"133/1843","text":"Rob McAlpine"}]},"title":"Resource Sharing for Control of Wildland Fires.","venue":"AAAI","pages":"1355-1361","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/TsangLM13","doi":"10.1609/AAAI.V27I1.8483","ee":"https://doi.org/10.1609/aaai.v27i1.8483","url":"https://dblp.org/rec/conf/aaai/TsangLM13"}, "url":"URL#4072051" }, { "@score":"1", "@id":"4072052", "info":{"authors":{"author":[{"@pid":"133/1823","text":"Ding Tu"},{"@pid":"17/1237-1","text":"Ling Chen 0001"},{"@pid":"89/241","text":"Gencai Chen"}]},"title":"WordNet Based Multi-Way Concept Hierarchy Construction from Text Corpus.","venue":"AAAI","pages":"1647-1648","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/TuCC13","doi":"10.1609/AAAI.V27I1.8531","ee":"https://doi.org/10.1609/aaai.v27i1.8531","url":"https://dblp.org/rec/conf/aaai/TuCC13"}, "url":"URL#4072052" }, { "@score":"1", "@id":"4072056", "info":{"authors":{"author":[{"@pid":"133/1801","text":"Andreas Veit"},{"@pid":"181/2619","text":"Ying Xu"},{"@pid":"127/9765","text":"Ronghuo Zheng"},{"@pid":"36/4037","text":"Nilanjan Chakraborty"},{"@pid":"s/KatiaPSycara","text":"Katia P. Sycara"}]},"title":"Multiagent Coordination for Energy Consumption Scheduling in Consumer Cooperatives.","venue":"AAAI","pages":"1362-1368","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/VeitXZCS13","doi":"10.1609/AAAI.V27I1.8482","ee":"https://doi.org/10.1609/aaai.v27i1.8482","url":"https://dblp.org/rec/conf/aaai/VeitXZCS13"}, "url":"URL#4072056" }, { "@score":"1", "@id":"4072058", "info":{"authors":{"author":[{"@pid":"16/2321","text":"Deepak Venugopal"},{"@pid":"14/4229","text":"Vibhav Gogate"}]},"title":"GiSS: Combining Gibbs Sampling and SampleSearch for Inference in Mixed Probabilistic and Deterministic Graphical Models.","venue":"AAAI","pages":"897-904","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/VenugopalG13","doi":"10.1609/AAAI.V27I1.8620","ee":"https://doi.org/10.1609/aaai.v27i1.8620","url":"https://dblp.org/rec/conf/aaai/VenugopalG13"}, "url":"URL#4072058" }, { "@score":"1", "@id":"4072060", "info":{"authors":{"author":[{"@pid":"75/4366","text":"Kiri L. Wagstaff"},{"@pid":"133/1778","text":"Nina L. Lanza"},{"@pid":"96/4739","text":"David R. Thompson 0001"},{"@pid":"d/TGDietterich","text":"Thomas G. Dietterich"},{"@pid":"52/9863","text":"Martha S. Gilmore"}]},"title":"Guiding Scientific Discovery with Explanations Using DEMUD.","venue":"AAAI","pages":"905-911","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WagstaffLTDG13","doi":"10.1609/AAAI.V27I1.8561","ee":"https://doi.org/10.1609/aaai.v27i1.8561","url":"https://dblp.org/rec/conf/aaai/WagstaffLTDG13"}, "url":"URL#4072060" }, { "@score":"1", "@id":"4072061", "info":{"authors":{"author":[{"@pid":"01/1066","text":"Mengqiu Wang"},{"@pid":"98/4640","text":"Wanxiang Che"},{"@pid":"m/ChristopherDManning","text":"Christopher D. Manning"}]},"title":"Effective Bilingual Constraints for Semi-Supervised Learning of Named Entity Recognizers.","venue":"AAAI","pages":"919-925","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WangCM13","doi":"10.1609/AAAI.V27I1.8617","ee":"https://doi.org/10.1609/aaai.v27i1.8617","url":"https://dblp.org/rec/conf/aaai/WangCM13"}, "url":"URL#4072061" }, { "@score":"1", "@id":"4072064", "info":{"authors":{"author":[{"@pid":"16/4075","text":"Yujing Wang"},{"@pid":"14/1705","text":"Yunhai Tong"},{"@pid":"52/2761-9","text":"Ming Zeng 0009"}]},"title":"Ranking Scientific Articles by Exploiting Citations, Authors, Journals, and Time Information.","venue":"AAAI","pages":"933-939","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WangTZ13","doi":"10.1609/AAAI.V27I1.8627","ee":"https://doi.org/10.1609/aaai.v27i1.8627","url":"https://dblp.org/rec/conf/aaai/WangTZ13"}, "url":"URL#4072064" }, { "@score":"1", "@id":"4072066", "info":{"authors":{"author":[{"@pid":"68/7658","text":"Yingze Wang"},{"@pid":"36/2125","text":"Guang Xiang"},{"@pid":"c/ShiKuoChang","text":"Shi-Kuo Chang"}]},"title":"Sparse Multi-Task Learning for Detecting Influential Nodes in an Implicit Diffusion Network.","venue":"AAAI","pages":"926-932","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WangXC13","doi":"10.1609/AAAI.V27I1.8575","ee":"https://doi.org/10.1609/aaai.v27i1.8575","url":"https://dblp.org/rec/conf/aaai/WangXC13"}, "url":"URL#4072066" }, { "@score":"1", "@id":"4072069", "info":{"authors":{"author":[{"@pid":"05/9799","text":"Ari Weinstein"},{"@pid":"l/MLLittman","text":"Michael L. Littman"}]},"title":"Open-Loop Planning in Large-Scale Stochastic Domains.","venue":"AAAI","pages":"1436-1442","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WeinsteinL13","doi":"10.1609/AAAI.V27I1.8547","ee":"https://doi.org/10.1609/aaai.v27i1.8547","url":"https://dblp.org/rec/conf/aaai/WeinsteinL13"}, "url":"URL#4072069" }, { "@score":"1", "@id":"4072071", "info":{"authors":{"author":[{"@pid":"w/LDarrellWhitley","text":"L. Darrell Whitley"},{"@pid":"h/AdeleEHowe","text":"Adele E. Howe"},{"@pid":"23/7185","text":"Doug Hains"}]},"title":"Greedy or Not? Best Improving versus First Improving Stochastic Local Search for MAXSAT.","venue":"AAAI","pages":"940-946","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WhitleyHH13","doi":"10.1609/AAAI.V27I1.8668","ee":"https://doi.org/10.1609/aaai.v27i1.8668","url":"https://dblp.org/rec/conf/aaai/WhitleyHH13"}, "url":"URL#4072071" }, { "@score":"1", "@id":"4072072", "info":{"authors":{"author":{"@pid":"26/9963","text":"Timothy Wiley"}},"title":"Multi-Strategy Learning of Robotic Behaviours via Qualitative Reasoning.","venue":"AAAI","pages":"1682-1683","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Wiley13","doi":"10.1609/AAAI.V27I1.8502","ee":"https://doi.org/10.1609/aaai.v27i1.8502","url":"https://dblp.org/rec/conf/aaai/Wiley13"}, "url":"URL#4072072" }, { "@score":"1", "@id":"4072073", "info":{"authors":{"author":[{"@pid":"45/740","text":"Thomas Emrys Williams"},{"@pid":"80/7939","text":"Rehj Cantrell"},{"@pid":"01/9770","text":"Gordon Briggs"},{"@pid":"02/2995","text":"Paul W. Schermerhorn"},{"@pid":"00/2197","text":"Matthias Scheutz"}]},"title":"Grounding Natural Language References to Unvisited and Hypothetical Locations.","venue":"AAAI","pages":"947-953","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WilliamsCBSS13","doi":"10.1609/AAAI.V27I1.8563","ee":"https://doi.org/10.1609/aaai.v27i1.8563","url":"https://dblp.org/rec/conf/aaai/WilliamsCBSS13"}, "url":"URL#4072073" }, { "@score":"1", "@id":"4072074", "info":{"authors":{"author":{"@pid":"69/9798","text":"Christopher Makoto Wilt"}},"title":"Steps Towards a Science of Heuristic Search.","venue":"AAAI","pages":"1684-1685","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Wilt13","doi":"10.1609/AAAI.V27I1.8493","ee":"https://doi.org/10.1609/aaai.v27i1.8493","url":"https://dblp.org/rec/conf/aaai/Wilt13"}, "url":"URL#4072074" }, { "@score":"1", "@id":"4072075", "info":{"authors":{"author":[{"@pid":"69/9798","text":"Christopher Makoto Wilt"},{"@pid":"80/5790","text":"Wheeler Ruml"}]},"title":"Robust Bidirectional Search via Heuristic Improvement.","venue":"AAAI","pages":"954-961","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WiltR13","doi":"10.1609/AAAI.V27I1.8662","ee":"https://doi.org/10.1609/aaai.v27i1.8662","url":"https://dblp.org/rec/conf/aaai/WiltR13"}, "url":"URL#4072075" }, { "@score":"1", "@id":"4072077", "info":{"authors":{"author":[{"@pid":"84/3254-1","text":"Fei Wu 0001"},{"@pid":"96/10484","text":"Xu Tan"},{"@pid":"33/4854-1","text":"Yi Yang 0001"},{"@pid":"46/3391","text":"Dacheng Tao"},{"@pid":"44/5693","text":"Siliang Tang"},{"@pid":"218/7793","text":"Yueting Zhuang"}]},"title":"Supervised Nonnegative Tensor Factorization with Maximum-Margin Constraint.","venue":"AAAI","pages":"962-968","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/WuTYTTZ13","doi":"10.1609/AAAI.V27I1.8598","ee":"https://doi.org/10.1609/aaai.v27i1.8598","url":"https://dblp.org/rec/conf/aaai/WuTYTTZ13"}, "url":"URL#4072077" }, { "@score":"1", "@id":"4072078", "info":{"authors":{"author":{"@pid":"18/3100","text":"Carol Hamilton 0001"}},"title":"AAAI Organization.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/X13","doi":"10.1609/AAAI.V27I1.8508","ee":"https://doi.org/10.1609/aaai.v27i1.8508","url":"https://dblp.org/rec/conf/aaai/X13"}, "url":"URL#4072078" }, { "@score":"1", "@id":"4072079", "info":{"authors":{"author":{"@pid":"18/3100","text":"Carol Hamilton 0001"}},"title":"Conference Committees.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/X13a","doi":"10.1609/AAAI.V27I1.8509","ee":"https://doi.org/10.1609/aaai.v27i1.8509","url":"https://dblp.org/rec/conf/aaai/X13a"}, "url":"URL#4072079" }, { "@score":"1", "@id":"4072080", "info":{"authors":{"author":{"@pid":"18/3100","text":"Carol Hamilton 0001"}},"title":"Awards.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/X13b","doi":"10.1609/AAAI.V27I1.8510","ee":"https://doi.org/10.1609/aaai.v27i1.8510","url":"https://dblp.org/rec/conf/aaai/X13b"}, "url":"URL#4072080" }, { "@score":"1", "@id":"4072081", "info":{"authors":{"author":{"@pid":"18/3100","text":"Carol Hamilton 0001"}},"title":"Sponsors.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/X13c","doi":"10.1609/AAAI.V27I1.8511","ee":"https://doi.org/10.1609/aaai.v27i1.8511","url":"https://dblp.org/rec/conf/aaai/X13c"}, "url":"URL#4072081" }, { "@score":"1", "@id":"4072082", "info":{"authors":{"author":{"@pid":"18/3100","text":"Carol Hamilton 0001"}},"title":"Invited Talks.","venue":"AAAI","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/X13d","doi":"10.1609/AAAI.V27I1.8515","ee":"https://doi.org/10.1609/aaai.v27i1.8515","url":"https://dblp.org/rec/conf/aaai/X13d"}, "url":"URL#4072082" }, { "@score":"1", "@id":"4072083", "info":{"authors":{"author":[{"@pid":"98/627-2","text":"Han Xiao 0002"},{"@pid":"e/ClaudiaEckert","text":"Claudia Eckert 0001"}]},"title":"Lazy Gaussian Process Committee for Real-Time Online Regression.","venue":"AAAI","pages":"969-976","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/XiaoE13","doi":"10.1609/AAAI.V27I1.8572","ee":"https://doi.org/10.1609/aaai.v27i1.8572","url":"https://dblp.org/rec/conf/aaai/XiaoE13"}, "url":"URL#4072083" }, { "@score":"1", "@id":"4072085", "info":{"authors":{"author":[{"@pid":"55/6548","text":"Deyi Xiong"},{"@pid":"83/5342-5","text":"Min Zhang 0005"}]},"title":"A Topic-Based Coherence Model for Statistical Machine Translation.","venue":"AAAI","pages":"977-983","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/XiongZ13","doi":"10.1609/AAAI.V27I1.8566","ee":"https://doi.org/10.1609/aaai.v27i1.8566","url":"https://dblp.org/rec/conf/aaai/XiongZ13"}, "url":"URL#4072085" }, { "@score":"1", "@id":"4072086", "info":{"authors":{"author":[{"@pid":"67/4330","text":"Yun Xiong"},{"@pid":"43/3858","text":"Yangyong Zhu"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"p/JianPei","text":"Jian Pei"}]},"title":"Towards Cohesive Anomaly Mining.","venue":"AAAI","pages":"984-990","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/XiongZYP13","doi":"10.1609/AAAI.V27I1.8553","ee":"https://doi.org/10.1609/aaai.v27i1.8553","url":"https://dblp.org/rec/conf/aaai/XiongZYP13"}, "url":"URL#4072086" }, { "@score":"1", "@id":"4072087", "info":{"authors":{"author":[{"@pid":"133/1700","text":"Joseph Zhen Ying Xu"},{"@pid":"l/JohnELaird","text":"John E. Laird"}]},"title":"Learning Integrated Symbolic and Continuous Action Models for Continuous Domains.","venue":"AAAI","pages":"991-997","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/XuL13","doi":"10.1609/AAAI.V27I1.8676","ee":"https://doi.org/10.1609/aaai.v27i1.8676","url":"https://dblp.org/rec/conf/aaai/XuL13"}, "url":"URL#4072087" }, { "@score":"1", "@id":"4072088", "info":{"authors":{"author":[{"@pid":"42/3241","text":"Miao Xu"},{"@pid":"57/413","text":"Yu-Feng Li"},{"@pid":"z/ZhiHuaZhou","text":"Zhi-Hua Zhou"}]},"title":"Multi-Label Learning with PRO Loss.","venue":"AAAI","pages":"998-1004","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/XuLZ13","doi":"10.1609/AAAI.V27I1.8689","ee":"https://doi.org/10.1609/aaai.v27i1.8689","url":"https://dblp.org/rec/conf/aaai/XuLZ13"}, "url":"URL#4072088" }, { "@score":"1", "@id":"4072089", "info":{"authors":{"author":[{"@pid":"38/3765","text":"Fusun Yaman"},{"@pid":"92/6348","text":"Brett Benyo"},{"@pid":"17/6332","text":"Alice M. Mulvehill"}]},"title":"Temporal Milestones in HTNs.","venue":"AAAI","pages":"1005-1011","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/YamanBM13","doi":"10.1609/AAAI.V27I1.8616","ee":"https://doi.org/10.1609/aaai.v27i1.8616","url":"https://dblp.org/rec/conf/aaai/YamanBM13"}, "url":"URL#4072089" }, { "@score":"1", "@id":"4072090", "info":{"authors":{"author":[{"@pid":"57/3385","text":"Xiao Yang"},{"@pid":"121/4285","text":"Zhaoxin Zhang"},{"@pid":"64/5630","text":"Qiang Wang"}]},"title":"Personalized Recommendation Based on Co-Ranking and Query-Based Collaborative Diffusion.","venue":"AAAI","pages":"1649-1650","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/YangZW13","doi":"10.1609/AAAI.V27I1.8534","ee":"https://doi.org/10.1609/aaai.v27i1.8534","url":"https://dblp.org/rec/conf/aaai/YangZW13"}, "url":"URL#4072090" }, { "@score":"1", "@id":"4072091", "info":{"authors":{"author":[{"@pid":"89/453","text":"Ming Yin"},{"@pid":"72/3762-1","text":"Yiling Chen 0001"},{"@pid":"75/5247-15","text":"Yuan Sun 0015"}]},"title":"The Effects of Performance-Contingent Financial Incentives in Online Labor Markets.","venue":"AAAI","pages":"1191-1197","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/YinCS13","doi":"10.1609/AAAI.V27I1.8461","ee":"https://doi.org/10.1609/aaai.v27i1.8461","url":"https://dblp.org/rec/conf/aaai/YinCS13"}, "url":"URL#4072091" }, { "@score":"1", "@id":"4072093", "info":{"authors":{"author":[{"@pid":"45/497","text":"Jingjin Yu"},{"@pid":"l/StevenMLaValle","text":"Steven M. LaValle"}]},"title":"Structure and Intractability of Optimal Multi-Robot Path Planning on Graphs.","venue":"AAAI","pages":"1443-1449","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/YuL13","doi":"10.1609/AAAI.V27I1.8541","ee":"https://doi.org/10.1609/aaai.v27i1.8541","url":"https://dblp.org/rec/conf/aaai/YuL13"}, "url":"URL#4072093" }, { "@score":"1", "@id":"4072095", "info":{"authors":{"author":[{"@pid":"66/636","text":"Xiaohua Zhai"},{"@pid":"13/3073","text":"Yuxin Peng"},{"@pid":"39/1115","text":"Jianguo Xiao"}]},"title":"Heterogeneous Metric Learning with Joint Graph Regularization for Cross-Media Retrieval.","venue":"AAAI","pages":"1198-1204","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhaiPX13","doi":"10.1609/AAAI.V27I1.8464","ee":"https://doi.org/10.1609/aaai.v27i1.8464","url":"https://dblp.org/rec/conf/aaai/ZhaiPX13"}, "url":"URL#4072095" }, { "@score":"1", "@id":"4072096", "info":{"authors":{"author":[{"@pid":"28/8212","text":"Haopeng Zhang 0001"},{"@pid":"12/8930","text":"Tarek El-Gaaly"},{"@pid":"e/AhmedMElgammal","text":"Ahmed M. Elgammal"},{"@pid":"08/1760","text":"Zhiguo Jiang"}]},"title":"Joint Object and Pose Recognition Using Homeomorphic Manifold Analysis.","venue":"AAAI","pages":"1012-1019","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangEEJ13","doi":"10.1609/AAAI.V27I1.8634","ee":"https://doi.org/10.1609/aaai.v27i1.8634","url":"https://dblp.org/rec/conf/aaai/ZhangEEJ13"}, "url":"URL#4072096" }, { "@score":"1", "@id":"4072097", "info":{"authors":{"author":[{"@pid":"65/7161","text":"Haoqi Zhang"},{"@pid":"h/EricHorvitz","text":"Eric Horvitz"},{"@pid":"p/DavidCParkes","text":"David C. Parkes"}]},"title":"Automated Workflow Synthesis.","venue":"AAAI","pages":"1020-1026","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangHP13","doi":"10.1609/AAAI.V27I1.8681","ee":"https://doi.org/10.1609/aaai.v27i1.8681","url":"https://dblp.org/rec/conf/aaai/ZhangHP13"}, "url":"URL#4072097" }, { "@score":"1", "@id":"4072098", "info":{"authors":{"author":[{"@pid":"133/1684","text":"Shubao Zhang"},{"@pid":"66/5293","text":"Hui Qian 0001"},{"@pid":"181/2832","text":"Wei Chen"},{"@pid":"52/5331","text":"Zhihua Zhang"}]},"title":"A Concave Conjugate Approach for Nonconvex Penalized Regression with the MCP Penalty.","venue":"AAAI","pages":"1027-1033","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangQCZ13","doi":"10.1609/AAAI.V27I1.8605","ee":"https://doi.org/10.1609/aaai.v27i1.8605","url":"https://dblp.org/rec/conf/aaai/ZhangQCZ13"}, "url":"URL#4072098" }, { "@score":"1", "@id":"4072099", "info":{"authors":{"author":[{"@pid":"05/3499-15","text":"Jing Zhang 0015"},{"@pid":"59/4107","text":"Xindong Wu 0001"},{"@pid":"36/4372","text":"Victor Shengli Sheng"}]},"title":"Imbalanced Multiple Noisy Labeling for Supervised Learning.","venue":"AAAI","pages":"1651-1652","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangWS13","doi":"10.1609/AAAI.V27I1.8530","ee":"https://doi.org/10.1609/aaai.v27i1.8530","url":"https://dblp.org/rec/conf/aaai/ZhangWS13"}, "url":"URL#4072099" }, { "@score":"1", "@id":"4072100", "info":{"authors":{"author":[{"@pid":"97/8704-86","text":"Lei Zhang 0086"},{"@pid":"07/146","text":"Chong-Jun Wang"},{"@pid":"20/3894-15","text":"Jun Wu 0015"},{"@pid":"07/3433","text":"Meilin Liu"},{"@pid":"62/1418","text":"Jun-Yuan Xie"}]},"title":"Planning with Multi-Valued Landmarks.","venue":"AAAI","pages":"1653-1654","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangWWLX13","doi":"10.1609/AAAI.V27I1.8520","ee":"https://doi.org/10.1609/aaai.v27i1.8520","url":"https://dblp.org/rec/conf/aaai/ZhangWWLX13"}, "url":"URL#4072100" }, { "@score":"1", "@id":"4072101", "info":{"authors":{"author":[{"@pid":"40/4372","text":"Xianchao Zhang"},{"@pid":"31/2303-3","text":"Xiaotong Zhang 0003"}]},"title":"Smart Multi-Task Bregman Clustering and Multi-Task Kernel Clustering.","venue":"AAAI","pages":"1034-1040","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhangZ13","doi":"10.1609/AAAI.V27I1.8557","ee":"https://doi.org/10.1609/aaai.v27i1.8557","url":"https://dblp.org/rec/conf/aaai/ZhangZ13"}, "url":"URL#4072101" }, { "@score":"1", "@id":"4072102", "info":{"authors":{"author":[{"@pid":"54/5985","text":"Lili Zhao"},{"@pid":"80/5412","text":"Sinno Jialin Pan"},{"@pid":"86/2174","text":"Evan Wei Xiang"},{"@pid":"31/5582","text":"Erheng Zhong"},{"@pid":"66/9923","text":"Zhongqi Lu"},{"@pid":"82/6362-1","text":"Qiang Yang 0001"}]},"title":"Active Transfer Learning for Cross-System Recommendation.","venue":"AAAI","pages":"1205-1211","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhaoPXZLY13","doi":"10.1609/AAAI.V27I1.8458","ee":"https://doi.org/10.1609/aaai.v27i1.8458","url":"https://dblp.org/rec/conf/aaai/ZhaoPXZLY13"}, "url":"URL#4072102" }, { "@score":"1", "@id":"4072103", "info":{"authors":{"author":[{"@pid":"13/1193","text":"Qibin Zhao"},{"@pid":"20/4627-1","text":"Liqing Zhang 0001"},{"@pid":"c/AndrzejCichocki","text":"Andrzej Cichocki"}]},"title":"A Tensor-Variate Gaussian Process for Classification of Multidimensional Structured Data.","venue":"AAAI","pages":"1041-1047","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhaoZC13","doi":"10.1609/AAAI.V27I1.8568","ee":"https://doi.org/10.1609/aaai.v27i1.8568","url":"https://dblp.org/rec/conf/aaai/ZhaoZC13"}, "url":"URL#4072103" }, { "@score":"1", "@id":"4072104", "info":{"authors":{"author":[{"@pid":"129/5142","text":"Jiangchuan Zheng"},{"@pid":"n/LionelMNi","text":"Lionel M. Ni"}]},"title":"Time-Dependent Trajectory Regression on Road Networks via Multi-Task Learning.","venue":"AAAI","pages":"1048-1055","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhengN13","doi":"10.1609/AAAI.V27I1.8577","ee":"https://doi.org/10.1609/aaai.v27i1.8577","url":"https://dblp.org/rec/conf/aaai/ZhengN13"}, "url":"URL#4072104" }, { "@score":"1", "@id":"4072105", "info":{"authors":{"author":[{"@pid":"133/1831","text":"Weifeng Zhi"},{"@pid":"31/2864-1","text":"Xiang Wang 0001"},{"@pid":"91/7441","text":"Buyue Qian"},{"@pid":"55/6669","text":"Patrick Butler"},{"@pid":"r/NarenRamakrishnan","text":"Naren Ramakrishnan"},{"@pid":"81/2360","text":"Ian Davidson"}]},"title":"Clustering with Complex Constraints - Algorithms and Applications.","venue":"AAAI","pages":"1056-1062","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhiWQBRD13","doi":"10.1609/AAAI.V27I1.8663","ee":"https://doi.org/10.1609/aaai.v27i1.8663","url":"https://dblp.org/rec/conf/aaai/ZhiWQBRD13"}, "url":"URL#4072105" }, { "@score":"1", "@id":"4072106", "info":{"authors":{"author":[{"@pid":"12/8845","text":"Sheng-hua Zhong"},{"@pid":"l/YanLiu4","text":"Yan Liu 0004"},{"@pid":"86/361","text":"Feifei Ren"},{"@pid":"133/1775","text":"Jinghuan Zhang"},{"@pid":"96/4050","text":"Tongwei Ren"}]},"title":"Video Saliency Detection via Dynamic Consistent Spatio-Temporal Attention Modelling.","venue":"AAAI","pages":"1063-1069","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhongLRZR13","doi":"10.1609/AAAI.V27I1.8642","ee":"https://doi.org/10.1609/aaai.v27i1.8642","url":"https://dblp.org/rec/conf/aaai/ZhongLRZR13"}, "url":"URL#4072106" }, { "@score":"1", "@id":"4072107", "info":{"authors":{"author":{"@pid":"01/2082","text":"Ying Zhu"}},"title":"Tools for Preference Reasoning.","venue":"AAAI","pages":"1686-1687","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/Zhu13","doi":"10.1609/AAAI.V27I1.8499","ee":"https://doi.org/10.1609/aaai.v27i1.8499","url":"https://dblp.org/rec/conf/aaai/Zhu13"}, "url":"URL#4072107" }, { "@score":"1", "@id":"4072108", "info":{"authors":{"author":[{"@pid":"218/7793","text":"Yueting Zhuang"},{"@pid":"07/5959","text":"Yanfei Wang"},{"@pid":"84/3254-1","text":"Fei Wu 0001"},{"@pid":"91/3045-6","text":"Yin Zhang 0006"},{"@pid":"41/5305-1","text":"Weiming Lu 0001"}]},"title":"Supervised Coupled Dictionary Learning with Group Structures for Multi-modal Retrieval.","venue":"AAAI","pages":"1070-1076","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhuangWWZL13","doi":"10.1609/AAAI.V27I1.8603","ee":"https://doi.org/10.1609/aaai.v27i1.8603","url":"https://dblp.org/rec/conf/aaai/ZhuangWWZL13"}, "url":"URL#4072108" }, { "@score":"1", "@id":"4072109", "info":{"authors":{"author":[{"@pid":"12/793","text":"Hankz Hankui Zhuo"},{"@pid":"26/11188-1","text":"Tuan Anh Nguyen 0001"},{"@pid":"k/SKambhampati","text":"Subbarao Kambhampati"}]},"title":"Model-Lite Case-Based Planning.","venue":"AAAI","pages":"1077-1083","year":"2013","type":"Conference and Workshop Papers","access":"open","key":"conf/aaai/ZhuoNK13","doi":"10.1609/AAAI.V27I1.8578","ee":"https://doi.org/10.1609/aaai.v27i1.8578","url":"https://dblp.org/rec/conf/aaai/ZhuoNK13"}, "url":"URL#4072109" }, { "@score":"1", "@id":"4225640", "info":{"authors":{"author":[{"@pid":"97/1893","text":"Marie desJardins"},{"@pid":"l/MLLittman","text":"Michael L. Littman"}]},"title":"Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, July 14-18, 2013, Bellevue, Washington, USA.","venue":"AAAI","publisher":"AAAI Press","year":"2013","type":"Editorship","access":"open","key":"conf/aaai/2013","ee":"https://ojs.aaai.org/index.php/AAAI/issue/view/306","url":"https://dblp.org/rec/conf/aaai/2013"}, "url":"URL#4225640" } ] } } } )