Refereed Articles | | | | |
---|
Generating, Executing, and Monitoring Plans with Goal-Based Utilities in Continuous Domains |
Pat Langley, Dongkyu Choi, Mike Barley, Ben Meadows, and Edward Katz |
1 |
PDF |
Managing Casual Spoken Dialogue Using Flexible Schemas, Pattern Transduction Trees, and Gist Clauses |
Seyedeh Zarah Razavi, Lenhart Schubert, Mohammad Rafayet Ali, and Mohammed Ehsan Hoque |
2 |
PDF |
Kinesthetic Mind-Reader: A Method to Identify Image Schemas in Natural Language |
Dagmar Gromann and Maria Hedblom |
3 |
PDF |
Treating Unexpected Input in Incremental Semantic Analysis |
Marjorie McShane, Kevin Blissett, and Irene Nirenburg |
4 |
PDF |
An Architecture for Discovering Affordances, Causal Laws, and Executability Conditions |
Mohan Sridharan and Benjamin Meadows |
5 |
PDF |
Simple Rules for Probabilistic Commonsense Reasoning |
Adam Purtee and Lenhart Schuber |
6 |
PDF |
Deep Learning of Raven’s Matrices |
Can Serif Mekik, Ron Sun, and David Yun Dai |
7 |
PDF |
Believe It or Not: Modeling Adversary Belief Formation in Stackelberg Security Games with Varying Information |
Debarun Kar, Subhasree Sengupta, Ece Kamar, Eric Horvitz, and Milind Tambe |
8 |
PDF |
Approximate Graph Matching for Mistake-Tolerant Skill Assessment |
Melinda Gervasio, Christian Jones, and Karen Myers |
9 |
PDF |
Character-Building Stories |
Dylan Holmes and Patrick Winston |
10 |
PDF |
A Cognitive Systems Analysis of Personality and Conversational Style |
Pat Langley |
11 |
PDF |
Cognitive Support for Rebel Agents: Social Awareness and Counternarrative Intelligence |
Alexandra Coman and David Aha |
12 |
PDF |