Published: 2011-01-01

False-Name Manipulations in Weighted Voting Games

H. Aziz, Y. Bachrach, E. Elkind, M. Paterson

57-93

A Monte-Carlo AIXI Approximation

J. Veness, K.S. Ng, M. Hutter, W. Uther, D. Silver

95-142

Second-Order Consistencies

C. Lecoutre, S. Cardon, J. Vion

175-219

Multimode Control Attacks on Elections

P. Faliszewski, E. Hemaspaandra, L. A. Hemaspaandra

305-351

Multiagent Learning in Large Anonymous Games

I. A. Kash, E. J. Friedman, J. Y. Halpern

571-598

The Complexity of Integer Bound Propagation

L. Bordeaux, G. Katsirelos, N. Narodytska, M. Y. Vardi

657-676

Identifying Aspects for Web-Search Queries

F. Wu, J. Madhavan, A. Halevy

677-700

Scaling up Heuristic Planning with Relational Decision Trees

T. De la Rosa, S. Jimenez, R. Fuentetaja, D. Borrajo

767-813

Regression Conformal Prediction with Nearest Neighbours

H. Papadopoulos, V. Vovk, A. Gammerman

815-840