Author of the publication

Counter attack detection with machine learning from log files of RoboCup simulation.

, , and . SCIS&ISIS, page 1821-1826. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statement-based Cost Estimate for Co-utilization of Service Facilities., , and . J. Inf. Process., 22 (2): 270-278 (2014)Commonality of Motions Having Effective Features with Respect to Methods for Identifying the Moves Made during Kumite Sparring in Karate., , and . icSPORTS, page 75-82. SCITEPRESS, (2020)Ants War with Evolutive Pheromone Style Communication., , , and . ECAL, volume 1674 of Lecture Notes in Computer Science, page 639-643. Springer, (1999)Behavior based water depth estimation for diver type small humanoid robot., and . ICARA, page 430-435. IEEE, (2009)Arbitrary Lattice Formation with Flocking Algorithm Applied to Camera Tracking System., , and . DARS, volume 104 of Springer Tracts in Advanced Robotics, page 247-258. Springer, (2012)Learning mimic impression for multi legged vehicle., , and . IROS, page 215-222. IEEE, (1996)Oscillator aggregation wheeled robot actively synchronizing with external environment., , and . CEC, page 1438-1443. IEEE, (2015)Counter attack detection with machine learning from log files of RoboCup simulation., , and . SCIS&ISIS, page 1821-1826. IEEE, (2012)An Indoor Autonomous Positioning and Navigation Service to Support Activities in Large-Scale Commercial Facilities., , , , , , and . ICServ, page 191-201. Springer, (2013)An Indoor Positioning System Based on Probabilistic Model with ZigBee Sensor Networks., , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 14 (6): 669-676 (2010)