Journal of Artificial Intelligence Research
Volume Thirty-Nine
Please Note: To view the abstract of a given article, select the link that is activated by the article title. The abstract will appear in a separate browser window. Full text of a given article can be selected in a similar manner from the link activitated by the title in the abstract window. (Most, but not all abstracts will link to full text.) PDF file sizes may be large!
This journal is also available in book and CD format.
Contents
Planning with Noisy Probabilistic Relational Rules / 1
T. Lang, M. Toussaint
Implicit Abstraction Heuristics / 51
M. Katz, C. Domshlak
The LAMA Planner: Guiding Cost-Based Anytime Planning with Landmarks / 127
S. Richter, M. Westphal
Cooperative Games with Overlapping Coalitions / 179
G. Chalkiadakis, E. Elkind, E. Markakis, M. Polukarov, N. R. Jennings
Narrative Planning: Balancing Plot and Character / 217
M. O. Riedl, R. M. Young
Case-Based Subgoaling in Real-Time Heuristic Search for Video Game Pathfinding / 269
V. Bulitko, Y. Björnsson, R. Lawrence
A Model-Based Active Testing Approach to Sequential Diagnosis / 301
A. Feldman, G. Provan, A. van Gemund
Active Tuples-Based Scheme for Bounding Posterior Beliefs / 335
B. Bidyuk, R. Dechter, E. Rollon
A Constraint Satisfaction Framework for Executing Perceptions and Actions in Diagrammatic Reasoning / 373
B. Banerjee, B. Chandrasekaran
Nominals, Inverses, Counting, and Conjunctive Queries or: Why Infinity Is Your Friend! / 429
S. Rudolph, B. Glimm
Kalman Temporal Differences / 483
M. Geist, O. Pietquin
Theta*: Any-Angle Path Planning on Grids / 533
K. Daniel, A. Nash, S. Koenig, A. Felner
Which Clustering Do You Want? Inducing Your Ideal Clustering with Minimal Feedback / 581
S. Dasgupta, V. Ng
A Utility-Theoretic Approach to Privacy in Online Services / 633
A. Krause, E. Horvitz
An Effective Algorithm for and Phase Transitions of the Directed Hamiltonian Cycle Problem / 663
Gerold Jäger, Weixiong Zhang
Best-First Heuristic Search for Multicore Machines / 689
E. Burns, S. Lemons, W. Ruml, R. Zhou
Intrusion Detection Using Continuous Time Bayesian Networks / 745
J. Xu, C. R. Shelton
Index / 775
AAAI Digital Library
AAAI relies on your generous support through membership and donations. If you find these resources useful, we would be grateful for your support.