


Остановите войну!
for scientists:
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Stephen Adams — disambiguation page
- Stephen Adams 0001
Microsoft Research - Stephen Adams 0002
University of Kent, Canterbury, UK
Likely matches
- Stephen C. Adams
University of Virginia, Department of Systems and Information Engineering, Charlottesville, VA, USA - Stephen R. Adams
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 141 matches
- 2022
- Jianyu Su
, Jing Huang
, Stephen C. Adams
, Qing Chang
, Peter A. Beling
:
Deep multi-agent reinforcement learning for multi-level preventive maintenance in manufacturing systems. Expert Syst. Appl. 192: 116323 (2022) - Derek L. Hill, Diane Stephenson, Jordan Brayanov, Kasper Claes
, Reham Badawy
, Sakshi Sardar, Katherine Fisher, Susan J. Lee, Anthony Bannon, George Roussos, Tairmae Kangarloo, Viktorija Terebaite, Martijn L. T. M. Müller
, Roopal Bhatnagar, Jamie L. Adams, E. Ray Dorsey, Josh Cosman:
Metadata Framework to Support Deployment of Digital Health Technologies in Clinical Trials in Parkinson's Disease. Sensors 22(6): 2136 (2022) - Georgios Bakirtzis
, Tim Sherburne, Stephen C. Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming:
An ontological metamodel for cyber-physical system safety, security, and resilience coengineering. Softw. Syst. Model. 21(1): 113-137 (2022) - Henning S. Mortveit, Stephen C. Adams, Faraz Dadgostari, Samarth Swarup, Peter A. Beling:
BESSIE: A Behavior and Epidemic Simulator for Use With Synthetic Populations. CoRR abs/2203.11414 (2022) - 2021
- Cody H. Fleming
, Carl R. Elks
, Georgios Bakirtzis
, Stephen C. Adams
, Bryan T. Carter, Peter A. Beling
, Barry M. Horowitz
:
Cyberphysical Security Through Resiliency: A Systems-Centric Approach. Computer 54(6): 36-45 (2021) - Steve Richardson, D. F. Gordon
, Stephen B. Swanekamp, I. M. Rittersdorf
, Paul E. Adamson
, O. S. Grannis, G. T. Morgan, A. Ostenfeld, K. L. Phlips
, C. G. Sun, G. Tang
, D. J. Watkins
:
TurboPy: A lightweight python framework for computational physics. Comput. Phys. Commun. 258: 107607 (2021) - Jianyu Su, Stephen C. Adams, Peter A. Beling:
Value-Decomposition Multi-Agent Actor-Critics. AAAI 2021: 11352-11360 - Tyler Cody, Stephen C. Adams, Peter A. Beling:
Trade-offs in Metric Learning for Bearing Fault Diagnosis. ICMLA 2021: 1100-1105 - Stephen C. Adams, Tyler Cody, Peter A. Beling:
Pareto-Optimal Active Learning with Cost. SMC 2021: 1519-1526 - Mark Rucker, Stephen C. Adams, Roy Hayes, Peter A. Beling:
Inverse Reinforcement Learning for Strategy Identification. SMC 2021: 3067-3074 - Tyler Cody, Stephen C. Adams, Peter A. Beling:
Empirically Measuring Transfer Distance for System Design and Operation. CoRR abs/2107.01184 (2021) - Mark Rucker, Stephen C. Adams, Roy Hayes, Peter A. Beling:
Inverse Reinforcement Learning for Strategy Identification. CoRR abs/2108.00293 (2021) - 2020
- Ram A. Dixit, Stephen Hurst, Katharine T. Adams, Christian Boxley, Kristi Lysen-Hendershot, Sonita S. Bennett, Ethan Booker, Raj M. Ratwani:
Rapid development of visualization dashboards to enhance situation awareness of COVID-19 telehealth initiatives at a multihospital healthcare system. J. Am. Medical Informatics Assoc. 27(9): 1456-1461 (2020) - Bryce Adams
, Louis Iverson, Stephen N. Matthews
, Matthew P. Peters
, Anantha M. Prasad, David M. Hix:
Mapping Forest Composition with Landsat Time Series: An Evaluation of Seasonal Composites and Harmonic Regression. Remote. Sens. 12(4): 610 (2020) - Stephen Frezza, Stephanie Adams:
Bridging Professionalism: Dispositions as Means for Relating Competency across Disciplines. FIE 2020: 1-5 - Stephen C. Adams, Tyler Cody, Peter A. Beling, Sherwood Polter, Kevin Farinholt:
Hierarchical Classification for Unknown Faults. ICPHM 2020: 1-8 - Stephen Adamshick, Sandhiya Reddy Govindarajulu, Elias A. Alwan:
A Novel Low Loss 3D System-in-Package Approach for 60GHz Antenna on Chip Applications. MWSCAS 2020: 537-540 - Suproteem K. Sarkar, Subhrajit Roy, Emily Alsentzer, Matthew B. A. McDermott, Fabian Falck, Ioana Bica, Griffin Adams, Stephen Pfohl, Stephanie L. Hyland:
Machine Learning for Health (ML4H) 2020: Advancing Healthcare for All. ML4H@NeurIPS 2020: 1-11 - Benjamin Choo, Graham Crannell, Stephen C. Adams, Faraz Dadgostari, Peter A. Beling, Ann Bolcavage, Roy McIntyre:
Reinforcement Learning from Simulated Environments: An Encoder Decoder Framework. SpringSim 2020: 1-12 - Jie Liu, Stephen C. Adams, Peter A. Beling:
An Ensemble Trust Scoring Method for Internet of Things Sensor Networks. WF-IoT 2020: 1-6 - Jianyu Su
, Stephen C. Adams, Peter A. Beling:
Counterfactual Multi-Agent Reinforcement Learning with Graph Convolution Communication. CoRR abs/2004.00470 (2020) - Georgios Bakirtzis, Tim Sherburne, Stephen C. Adams, Barry M. Horowitz, Peter A. Beling, Cody H. Fleming:
An Ontological Metamodel for Cyber-Physical System Safety, Security, and Resilience Coengineering. CoRR abs/2006.05304 (2020) - Jianyu Su, Stephen C. Adams, Peter A. Beling:
Value-Decomposition Multi-Agent Actor-Critics. CoRR abs/2007.12306 (2020) - Cody H. Fleming, Carl R. Elks, Georgios Bakirtzis, Stephen C. Adams, Bryan T. Carter, Peter A. Beling, Barry M. Horowitz:
Cyber-Physical Security Through Resiliency: A Systems-centric Approach. CoRR abs/2011.14469 (2020) - 2019
- Stephen C. Adams
, Peter A. Beling:
A survey of feature selection methods for Gaussian mixture models and hidden Markov models. Artif. Intell. Rev. 52(3): 1739-1779 (2019) - Mark F. Adams, Stephen L. Cornford, Daniel F. Martin
, Peter McCorquodale:
Composite matrix construction for structured grid adaptive mesh refinement. Comput. Phys. Commun. 244: 35-39 (2019) - Xiaomin Lin
, Stephen C. Adams, Peter A. Beling:
Multi-agent Inverse Reinforcement Learning for Certain General-sum Stochastic Games. J. Artif. Intell. Res. 66: 473-502 (2019) - Winston R. Liaw, Anuradha Jetty, Megan Coffman, Stephen Petterson, Miranda A. Moore
, Gayathri Sridhar, Aliza S. Gordon, Judith J. Stephenson, Wallace Adamson, Andrew W. Bazemore:
Disconnected: a survey of users and nonusers of telehealth and their use of primary care. J. Am. Medical Informatics Assoc. 26(5): 420-428 (2019) - Robert A. Pfeiffer, John C. Young
, Robert J. Adams, Stephen D. Gedney:
Higher-order simulation of impressed current cathodic protection systems. J. Comput. Phys. 394: 522-531 (2019) - Jeremy Fowers, Kalin Ovtcharov, Michael K. Papamichael, Todd Massengill, Ming Liu, Daniel Lo, Shlomi Alkalay, Michael Haselman, Logan Adams, Mahdi Ghandi, Stephen Heil, Prerak Patel, Adam Sapek, Gabriel Weisz, Lisa Woods, Sitaram Lanka, Steven K. Reinhardt, Adrian M. Caulfield, Eric S. Chung, Doug Burger:
Inside Project Brainwave's Cloud-Scale, Real-Time AI Processor. IEEE Micro 39(3): 20-28 (2019)
skipping 111 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2022-06-27 03:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint