Abstract is missing.
- The AAAI-18 Workshop on Affective Content AnalysisNiyati Chhaya, Kokil Jaidka, Lyle H. Ungar. 2-7 [doi]
- Why Is an Event Affective? Classifying Affective Events Based on Human NeedsHaibo Ding, Tianyu Jiang, Ellen Riloff. 8-15 [doi]
- Knowledge-Driven Feed-Forward Neural Network for Audio Affective Content AnalysisSri Harsha Dumpala, Rupayan Chakraborty, Sunil Kumar Kopparapu. 16-20 [doi]
- Multimodal Alignment for Affective ContentNikita Haduong, David Nester, Preethi Vaidyanathan, Emily Prud'hommeaux, Reynold Bailey, Cecilia Ovesdotter Alm. 21-28 [doi]
- Do Convolutional Networks Need to Be Deep for Text Classification ?Hoa T. Le, Christophe Cerisara, Alexandre Denis. 29-36 [doi]
- Predicting Engagement Breakdown in HRI Using Thin-Slices of Facial ExpressionsTianlin Liu, Arvid Kappas. 37-43 [doi]
- Emotion Detection on TV Show Transcripts with Sequence-Based Convolutional Neural NetworksSayyed M. Zahiri, Jinho D. Choi. 44-52 [doi]
- Finding Exogenous Variation in DataEliot Abrams, George Gui, Ali Hortaçsu. 53-58 [doi]
- Learning User Intent from Action Sequences on Interactive SystemsRakshit Agrawal, Anwar Habeeb, Chih-Hsin Hsueh. 59-64 [doi]
- Thematic Distillation and Point of View Extraction for Enterprise-Level DocumentsElham Khabiri, Wesley M. Gifford, Pietro Mazzoleni, Dharmesh Vadgama. 65-70 [doi]
- Visual Listening In: Extracting Brand Image Portrayed on Social MediaLiu Liu, Daria Dzyabura, Natalie Mizik. 71-77 [doi]
- Large Scale Cross-Category Analysis of Consumer Review Content on Sales Conversion Leveraging Deep LearningXiao Liu, Dokyun Lee, Kannan Srinivasan. 78-84 [doi]
- Large Scale Online Brand Networks to Study Brand EffectsPankhuri Malhotra, Siddhartha Bhattacharyya. 85-92 [doi]
- Bingeability and Ad Tolerance: New Metrics for the Streaming Media AgePrashant Rajaram, Puneet Manchanda, Eric Schwartz. 93-99 [doi]
- Machine Learning Based Prediction of Consumer Purchasing Decisions: The Evidence and Its SignificanceSaavi Stubseid, Ognjen Arandjelovic. 100-106 [doi]
- VoC-DL: Revisiting Voice of Customer Using Deep LearningSusheel Suresh, Guru Rajan T. S, Vipin Gopinath. 107-112 [doi]
- Inferring Brand Knowledge from Online Consumer Associative Brand NetworksMinghong Xu, Siddhartha Bhattacharyya. 113-121 [doi]
- POMDP: State-Based Decision Making for Personalized Assistive RobotsHend Al Tair, Gonçalo S. Martins, Luís Santos, Jorge Dias 0001. 122-125 [doi]
- Unsupervised Morphological Segmentation for Detecting Parkinson's DiseaseElif Eyigöz, Pablo Polosecki, Adolfo M. García, Katharina Rogg, Juan Rafael Orozco-Arroyave, Sabine Skodda, Eugenia Hesse, Agustín Ibáñez, Guillermo A. Cecchi. 126-131 [doi]
- Deep Multiple Instance Feature Learning via Variational AutoencoderShabnam Ghaffarzadegan. 132-140 [doi]
- Personalisation of Exercises in VRETJoris Heyse, Femke Ongenae, Femke De Backere, Filip De Turck. 141-144 [doi]
- Chatti: A Conversational Chatbot PlatformInchul Hwang, Heesik Jeon, Hyung Rai Oh, Donghyeon Lee, Munjo Kim, Jihie Kim. 145-148 [doi]
- Automatic Sign Detection with Application to an Assistive RobotAmlaan Shakeel, Peining Che, Xien Liu, Yamuna Rajesekhar, John C. Femiani. 149-152 [doi]
- Self-Learning Algorithms for the Personalised Interaction with People with DementiaBram Steenwinckel, Femke De Backere, Jelle Nelis, Femke Ongenae, Filip De Turck. 153-158 [doi]
- Output Encoding by Compressed Sensing for Cell Detection with Deep ConvnetYao Xue, Nilanjan Ray. 159-166 [doi]
- Learning the Influence Structure between Partially Observed Stochastic Processes Using IoT Sensor DataRitesh Ajoodha, Benjamin Rosman. 167-173 [doi]
- Transfer Learning for Traffic Speed Prediction: A Preliminary StudyBill Y. Lin, Frank F. Xu, Eve Q. Liao, Kenny Q. Zhu. 174-177 [doi]
- Encoding Temporal Markov Dynamics in Graph for Visualizing and Mining Time SeriesLu Liu, Zhiguang Wang. 178-184 [doi]
- Towards Knowledge Oriented Intelligent Audio AnalyticsAlessandro Oltramari, Joseph Szurley, Samarjit Das, Jonathan Francis, Juncheng Li. 185-188 [doi]
- Real-Time Planning for Traffic Signal ControlAlison Paredes, Wheeler Ruml. 189-193 [doi]
- Efficient Scene Labeling via Sparse AnnotationsCan Qin, Maoguo Gong, Yue Wu 0004, Dayong Tian, Puzhao Zhang. 194-201 [doi]
- ILPC: Iterative Learning Using Physical Constraints in Real-World Sensing DataTong Yu, Shijia Pan, Susu Xu, Xinlei Chen, Mostafa Mirshekari, Jonathon Fagert, Hae Young Noh, Pei Zhang, Ole J. Mengshoel. 202-208 [doi]
- Recover Missing Sensor Data with Iterative Imputing NetworkJingguang Zhou, Zili Huang. 209-216 [doi]
- End-to-End Active Learning for Computer Security ExpertsAnaël Beaugnon, Pierre Chifflier, Francis Bach. 217-224 [doi]
- RADMAX: Risk and Deadline Aware Planning for Maximum UtilityJingkai Chen, Cheng Fang, Christian J. Muise, Howard Shrobe, Brian C. Williams, Peng Yu. 225-230 [doi]
- "Attention" for Detecting Unreliable News in the Information AgeVenkatesh Duppada. 231-236 [doi]
- Adequacy of the Gradient-Descent Method for Classifier Evasion AttacksYi Han 0003, Benjamin I. P. Rubinstein. 237-244 [doi]
- Black-Box Attacks against RNN Based Malware Detection AlgorithmsWeiwei Hu, Ying Tan 0002. 245-251 [doi]
- Steganographic Internet of Things: Graph Topology Timing ChannelsIra S. Moskowitz, Stephen Russell 0001, Brian Jalaian. 252-259 [doi]
- Deceitful Attacks in Security GamesThanh Hong Nguyen, Michael P. Wellman, Arunesh Sinha. 260-267 [doi]
- Malware Detection by Eating a Whole EXEEdward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles K. Nicholas. 268-276 [doi]
- Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with FeedbackMd Amran Siddiqui, Alan Fern, Ryan Wright, Alec Theriault, David W. Archer, William Maxwell. 277-284 [doi]
- Recurrent Neural Network Language Models for Open Vocabulary Event-Level Cyber Anomaly DetectionAaron Randall Tuor, Ryan Baerwolf, Nicolas Knowles, Brian Hutchinson, Nicole Nichols, Robert Jasper. 285-293 [doi]
- Robust Stackelberg Equilibria in Extensive-Form Games and Extension to Limited LookaheadChristian Kroer, Gabriele Farina, Tuomas Sandholm. 294-301 [doi]
- Dynamic Adaptation and Opponent Exploitation in Computer PokerXun Li, Risto Miikkulainen. 302-309 [doi]
- Consequentialist Conditional Cooperation in Social Dilemmas with Imperfect Information (Short Workshop Version)Alexander Peysakhovich, Adam Lerer. 310-316 [doi]
- Evaluating the Stability of Non-Adaptive Trading in Continuous Double Auctions: A Reinforcement Learning ApproachMason Wright, Michael P. Wellman. 317-324 [doi]
- Deep Reinforcement Learning for Green Security Game with Online InformationLantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang. 325-333 [doi]
- Fairness-Aware Relational Learning and InferenceGolnoosh Farnadi, Behrouz Babaki, Lise Getoor. 333-335 [doi]
- Image Classification Using Deep Learning and Prior KnowledgeSoumali Roychowdhury, Michelangelo Diligenti, Marco Gori. 336-343 [doi]
- Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in UgandaShahrzad Gholami, Benjamin J. Ford, Debarun Kar, Fei Fang, Milind Tambe, Andrew J. Plumptre, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga. 344-347 [doi]
- Autonomous Model Management via Reinforcement LearningElad Liebman, Eric Zavesky, Peter Stone. 348-355 [doi]
- Can We Achieve Open Category Detection with Guarantees?Si Liu, Risheek Garrepalli, Alan Fern, Thomas G. Dietterich. 356-363 [doi]
- Denoising Dictionary Learning Against Adversarial PerturbationsJohn Mitro, Derek Bridge, Steve Prestwich. 364-371 [doi]
- Optimizing Hierarchical Classification with Adaptive Node CollapsesSujan Perera, Orna Raz, Ramani Routray, Shenghua Bao, Marcel Zalmanovici. 372-375 [doi]
- MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target DefenseSailik Sengupta, Tathagata Chakraborti, Subbarao Kambhampati. 376-383 [doi]
- Multiple-Implementation Testing of Supervised Learning SoftwareSiwakorn Srisakaokul, Zhengkai Wu, Angello Astorga, Oreoluwa Alebiosu, Tao Xie. 384-391 [doi]
- Climbing the Kaggle Leaderboard by Exploiting the Log-Loss OracleJacob Whitehill. 392-399 [doi]
- Telemade: A Testing Framework for Learning-Based Malware Detection SystemsWei Yang 0013, Tao Xie. 400-403 [doi]
- Distributed Deep Learning under Differential Privacy with the Teacher-Student ParadigmJun Zhao. 404-408 [doi]
- Multi-Label Classification of Patient Notes: Case Study on ICD Code AssignmentTal Baumel, Jumana Nassour-Kassis, Raphael Cohen, Michael Elhadad, Noémie Elhadad. 409-416 [doi]
- Personalized Healthcare for Patients Access to Price TransparencyWilliam E. Cheetham. 417-424 [doi]
- Detecting Personal Experience Tweets for Health Surveillance Using Unsupervised Feature Learning and Recurrent Neural NetworksShichao Feng, Keyuan Jiang, Jiyun Li, Ricardo A. Calix, Matrika Gupta. 425-430 [doi]
- Assistive AI for Coping with Memory LossLibby Ferland, Ziwei Li, Shridhar Sukhani, Joan Zheng, Luyang Zhao, Maria Gini. 431-434 [doi]
- Personalized Medication Dosing Using Volatile Data StreamsMohammad M. Ghassemi, Tuka Al Hanai, M. Brandon Westover, Roger G. Mark, Shamim Nemati. 435-442 [doi]
- Learning Disentangled Representation from 12-Lead Electrograms: Application in Localizing the Origin of Ventricular TachycardiaPrashnna K. Gyawali, B. Milan Horácek, John L. Sapp, Linwei Wang. 443-450 [doi]
- Feature Extraction from Electronic Health Records of Diabetic Nephropathy Patients with Convolutioinal AutoencoderTakayuki Katsuki, Masaki Ono, Akira Koseki, Michiharu Kudo, Kyoichi Haida, Jun Kuroda, Masaki Makino, Ryosuke Yanagiya, Atsushi Suzuki. 451-454 [doi]
- Towards an Argumentation System for Supporting Patients in Self-Managing Their Chronic ConditionsNadin Kökciyan, Isabel Sassoon, Anthony P. Young, Martin Chapman, Talya Porat, Mark Ashworth, Vasa Curcin, Sanjay Modgil, Simon Parsons, Elizabeth Sklar. 455-462 [doi]
- A Predictive Analytics Methodology to Assess and Optimize Readmission Risk in Heart Failure PatientsPavitra Krishnaswamy, Savitha Ramasamy, Abdullah Al-Dujaili, Srinath Sridharan, Geraldine Goh, Shao Chuen Tong, Khin Chaw Yu Aung, Gerard Leong Kui Toh, Michael Ross Macdonald, Sheldon Lee Shao Guang, Yan Cao, Suresh Sundaram, Chow Wai Leng. 463-464 [doi]
- Using Digital Purchasing Data to Generate Public Health Evidence: Learning Unhealthy Beverage Demand from Grocery Transaction DataHiroshi Mamiya, Xing Han Lu, Yu Ma, David L. Buckeridge. 465-469 [doi]
- Graphically Representing Child-Robot Interaction ProxemicsMarie Denise Manner, Maria L. Gini, Jed T. Elison. 470-478 [doi]
- A Framework for Utilizing Lab Test Results for Clinical Prediction of ICU PatientsMohammad Mehedy Masud, Muhsin Cheratta. 479-486 [doi]
- Balancing Lexicographic Fairness and a Utilitarian Objective with Application to Kidney ExchangeDuncan C. McElfresh, John P. Dickerson. 487-494 [doi]
- Integrating Environmental Data, Citizen Science and Personalized Predictive Modeling to Support Public Health in Cities: The PULSE WebGISEnea Parimbelli, Daniele Pala, Riccardo Bellazzi, Cecilia Vera-Mñnoz, Vittorio Casella. 495-498 [doi]
- Topical Phrase Extraction from Clinical Reports by Incorporating both Local and Global ContextGabriele Pergola, Yulan He, David Lowe. 499-506 [doi]
- Using Machine Learning and Urine Cytology for Bladder Cancer Prescreening and Patient StratificationWilliam Tun, Ognjen Arandjelovic, Peter David Caie. 507-513 [doi]
- Diabetic Retinopathy Detection via Deep Convolutional Networks for Discriminative Localization and Visual ExplanationZhiguang Wang, Jianbo Yang. 514-521 [doi]
- Preventing Infectious Disease in Dynamic Populations Under UncertaintyBryan Wilder, Sze-Chuan Suen, Milind Tambe. 522-529 [doi]
- Learning Bayesian Network Structure by Self-Generating Prior Information: The Two-Step Clustering-Based StrategyYikun Zhang, Yang Liu 0007, Jiming Liu 0001. 530-537 [doi]
- Utilizing Social Media to Combat Opioid Addiction Epidemic: Automatic Detection of Opioid Users from TwitterYiming Zhang, Yujie Fan, Yanfang Ye, Xin Li, Erin L. Winstanley. 538-546 [doi]
- Roles that Plan, Activity, and Intent Recognition with Planning Can Play in GamesRichard Gabriel Freedman, Shlomo Zilberstein. 547-551 [doi]
- Threat, Explore, Barter, Puzzle: A Semantically-Informed Algorithm for Extracting Interaction ModesNancy Fulda, Daniel Ricks, Ben Murdoch, David Wingate. 552-556 [doi]
- Combinatorial Creativity for Procedural Content Generation via Machine LearningMatthew J. Guzdial, Mark O. Riedl. 557-564 [doi]
- Towards Explainable NPCs: A Relational Exploration Learning AgentMatthew Molineaux, Dustin Dannenhauer, David W. Aha. 565-569 [doi]
- Towards Inductive Logic Programming for Game Analysis: LedaAdam Summerville. 570-573 [doi]
- Extraction of Interaction Events for Learning Reasonable Behavior in an Open-World Survival GameEmmett Tomai. 574-580 [doi]
- Concept-Aware Feature Extraction for Knowledge Transfer in Reinforcement LearningJohn Winder, Marie desJardins. 581-585 [doi]
- Retrieving Game States with Moment VectorsZeping Zhan, Adam M. Smith. 586-592 [doi]
- Validation of Hierarchical Plans via Parsing of Attribute GrammarsRoman Barták, Adrien Maillard, Rafael Cauê Cardoso. 593-600 [doi]
- Towards Quicker Probabilistic Recognition with Multiple Goal Heuristic SearchRichard G. Freedman, Yi Ren Fung, Roman Ganchin, Shlomo Zilberstein. 601-606 [doi]
- Plan and Goal Recognition as HTN PlanningDaniel Höller, Pascal Bercher, Gregor Behnke, Susanne Biundo. 607-613 [doi]
- DIPD: Gaze-Based Intention Inference in Dynamic EnvironmentsYu-Sian Jiang, Garrett Warnell, Peter Stone. 614-621 [doi]
- Comparing Plan Recognition Algorithms through Standard LibrariesReuth Mirsky, Ran Galun, Ya'akov Gal, Gal A. Kaminka. 622-629 [doi]
- Goal Recognition in Incomplete STRIPS Domain ModelsRamon Fraga Pereira, Felipe Meneguzzi. 630-637 [doi]
- Online Goal Recognition as Reasoning over LandmarksMor Vered, Ramon Fraga Pereira, Mauricio Cecilio Magnaguagno, Felipe Meneguzzi, Gal A. Kaminka. 638-645 [doi]
- Inverse Reinforcement Learning Based Human Behavior Modeling for Goal Recognition in Dynamic Local Network InterdictionYunxiu Zeng, Kai Xu, Quanjun Yin, Long Qin, Yabing Zha, William Yeoh 0001. 646-653 [doi]
- Probabilistic Planning by Probabilistic ProgrammingVaishak Belle. 654-657 [doi]
- Lifted Stochastic Planning, Belief Propagation and Marginal MAPHao Cui, Roni Khardon. 658-664 [doi]
- Planning and Learning for Decentralized MDPs with Event Driven RewardsTarun Gupta 0002, Akshat Kumar, Praveen Paruchuri. 665 [doi]
- Learning Others' Intentional Models in Multi-Agent Settings Using Interactive POMDPsYanlin Han, Piotr J. Gmytrasiewicz. 666-673 [doi]
- Generalized Dual Decomposition for Bounding Maximum Expected Utility of Influence Diagrams with Perfect RecallJunkyu Lee, Alexander T. Ihler, Rina Dechter. 674-681 [doi]
- R2PG: Risk-Sensitive and Reliable Policy GradientBo Liu, Ji Liu, Kenan Xiao. 682-687 [doi]
- An Inherently Explainable Model for Video Activity InterpretationSathyanarayanan N. Aakur, Fillipe D. M. de Souza, Sudeep Sarkar. 688-694 [doi]
- Safebot: A Safe Collaborative ChatbotMerav Chkroun, Amos Azaria. 695-698 [doi]
- MEETING BOT: Reinforcement Learning for Dialogue Based Meeting SchedulingVishwanath D, Lovekesh Vig, Gautam Shroff, Puneet Agarwal. 699-705 [doi]
- Building Dialogue Structure from Discourse Tree of a QuestionBoris A. Galitsky. 706-712 [doi]
- Specifying and Implementing Multi-Party Conversation Rules with Finite-State-AutomataMaíra Gatti de Bayser, Melina Alberio Guerra, Paulo R. Cavalin, Claudio S. Pinhanez. 713-719 [doi]
- Gated Orthogonal Recurrent Units: On Learning to ForgetLi Jing, Çaglar Gülçehre, John Peurifoy, Yichen Shen, Max Tegmark, Marin Soljacic, Yoshua Bengio. 720-726 [doi]
- Making Personalized Recommendation through Conversation: Architecture Design and Recommendation MethodsSunhwan Lee, Robert J. Moore, Guang-Jie Ren, Raphael Arar, Shun Jiang. 727-730 [doi]
- Automatic Extraction of Domain Specific Latent Beliefs in Customer Complaints to Help Tailor ChatbotsAmit Sangroya, C. Anantaram, Pratik Saini, Mrinal Rawat. 731-734 [doi]
- Knowledge-Graph Driven Information State Approach to DialogSvetlana Stoyanchev, Michael Johnston. 735-738 [doi]
- Production Ready Chatbots: Generate if Not RetrieveAniruddha Tammewar, Monik Pamecha, Chirag Jain, Apurva Nagvenkar, Krupal Modi. 739-745 [doi]
- State Tracking Networks for Dialog State TrackingXuguang Wang, Xingyi Cheng, Jie Zhou, Wei Xu. 746-753 [doi]
- Automated Refactoring of Object-Oriented Code Using Clustering EnsemblesTimofey Bryksin, Alexey Shpilman, Daniel Kudenko. 754-757 [doi]
- Cross-Language Learning for Program Classification Using Bilateral Tree-Based Convolutional Neural NetworksNghi D. Q. Bui, Lingxiao Jiang, Yijun Yu. 758-761 [doi]
- Towards Traceability Link Recovery for Self-Adaptive SystemsReihaneh H. Hariri, Erik M. Fredericks. 762-766 [doi]
- Extracting Information Types from Android Layout Code Using Sequence to Sequence LearningMitra Bokaei Hosseini, Xue-qin, Jianwei Niu 0001. 767-770 [doi]
- Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source CodeJeremy Lacomis, Alan Jaffe, Edward J. Schwartz, Claire Le Goues, Bogdan Vasilescu. 771-774 [doi]
- Natural Language Processing and Program Analysis for Supporting Todo Comments as Software EvolvesPengyu Nie, Junyi Jessy Li, Sarfraz Khurshid, Raymond J. Mooney, Milos Gligoric. 775-778 [doi]
- Towards J.A.R.V.I.S. for Software Engineering: Lessons Learned in Implementing a Natural Language Chat InterfaceRahul Pandita, Steven Bucuvalas, Hugolin Bergier, Aleksandar Chakarov, Elizabeth Richards. 779-782 [doi]
- Evaluation of Type Inference with Textual CuesAmirreza Shirani, Adrián Pastor López-Monroy, Fabio A. González, Thamar Solorio, Mohammad Amin Alipour. 783-786 [doi]
- Using Natural Language Processing for Documentation AssistAlexandre Terrasa, Jean Privat, Guy Tremblay. 787-790 [doi]
- Generating Regular Expressions from Natural Language Specifications: Are We There Yet?Zexuan Zhong, Jiaqi Guo, Wei Yang 0013, Tao Xie 0001, Jian-Guang Lou, Ting Liu, Dongmei Zhang. 791-794 [doi]