| Refereed Articles |   |   |   |   | 
|---|
| Generating, Executing, and Monitoring Plans with Goal-Based Utilities in Continuous Domains | 
Pat Langley, Dongkyu Choi, Mike Barley, Ben Meadows, and Edward Katz | 
1 | 
PDF  | 
| Managing Casual Spoken Dialogue Using Flexible Schemas, Pattern Transduction Trees, and Gist Clauses | 
Seyedeh Zarah Razavi, Lenhart Schubert, Mohammad Rafayet Ali, and Mohammed Ehsan Hoque | 
2 | 
PDF  | 
| Kinesthetic Mind-Reader: A Method to Identify Image Schemas in Natural Language | 
Dagmar Gromann and Maria Hedblom | 
3 | 
PDF  | 
| Treating Unexpected Input in Incremental Semantic Analysis | 
Marjorie McShane, Kevin Blissett, and Irene Nirenburg | 
4 | 
PDF  | 
| An Architecture for Discovering Affordances, Causal Laws, and Executability Conditions | 
Mohan Sridharan and Benjamin Meadows | 
5 | 
PDF  | 
| Simple Rules for Probabilistic Commonsense Reasoning | 
Adam Purtee and Lenhart Schuber | 
6 | 
PDF  | 
| Deep Learning of Raven’s Matrices | 
Can Serif Mekik, Ron Sun, and David Yun Dai | 
7 | 
PDF  | 
| Believe It or Not: Modeling Adversary Belief Formation in Stackelberg Security Games with Varying Information | 
Debarun Kar, Subhasree Sengupta, Ece Kamar, Eric Horvitz, and Milind Tambe | 
8 | 
PDF  | 
| Approximate Graph Matching for Mistake-Tolerant Skill Assessment | 
Melinda Gervasio, Christian Jones, and Karen Myers | 
9 | 
PDF  | 
| Character-Building Stories | 
Dylan Holmes and Patrick Winston | 
10 | 
PDF  | 
| A Cognitive Systems Analysis of Personality and Conversational Style | 
Pat Langley | 
11 | 
PDF  | 
| Cognitive Support for Rebel Agents: Social Awareness and Counternarrative Intelligence | 
Alexandra Coman and David Aha | 
12 | 
PDF  |