

Author: Kober Jens Peters Jan
Publisher: Springer Publishing Company
ISSN: 0885-6125
Source: Machine Learning, Vol.84, Iss.1-2, 2011-07, pp. : 171-203
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Training in robotics at Nissan Motor Company
Advanced Robotics, Vol. 2, Iss. 4, 1987-01 ,pp. :






Primitives for authentication in process algebras
By Bodei C. Degano P. Focardi R. Priami C.
Theoretical Computer Science, Vol. 283, Iss. 2, 2002-06 ,pp. :