Author of the publication

Reinforcement Learning for Sustainable Mobility: Modeling Pedalcoin, a Gamified Biking Application.

, , , and . HAI, page 461-463. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The arms race: Adversarial search defeats entropy used to detect malware., , , and . Expert Syst. Appl., (2019)Byte Label Malware Classification Using Image Entropy., , and . ACSS (2), volume 883 of Advances in Intelligent Systems and Computing, page 17-29. Springer, (2018)Undertaking the tokeneer challenge in event-b., , and . FormaliSE@ICSE, page 8-14. ACM, (2016)Shellmark: A Robust Software Watermarking Tool., , , and . COMAD/CODS, page 260-264. ACM, (2019)Distortion-Free Authentication Watermarking., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 205-219. Springer, (2010)Reinforcement Learning for Sustainable Mobility: Modeling Pedalcoin, a Gamified Biking Application., , , and . HAI, page 461-463. ACM, (2023)A Generic Distortion Free Watermarking Technique for Relational Databases., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 252-264. Springer, (2009)A Distortion Free Watermark Framework for Relational Databases., and . ICSOFT (2), page 229-234. INSTICC Press, (2009)ITect: Scalable Information Theoretic Similarity for Malware Detection., , , and . CoRR, (2016)A Novel 2.5D Shadow Calculation Algorithm for Urban Environment., , and . GISTAM, page 274-281. SciTePress, (2019)