|
|
|
|
LEADER |
04266nam a22006015i 4500 |
001 |
978-3-642-41575-3 |
003 |
DE-He213 |
005 |
20151030101827.0 |
007 |
cr nn 008mamaa |
008 |
131028s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642415753
|9 978-3-642-41575-3
|
024 |
7 |
|
|a 10.1007/978-3-642-41575-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q334-342
|
050 |
|
4 |
|a TJ210.2-211.495
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TJFM1
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Algorithmic Decision Theory
|h [electronic resource] :
|b Third International Conference, ADT 2013, Bruxelles, Belgium, November 12-14, 2013, Proceedings /
|c edited by Patrice Perny, Marc Pirlot, Alexis Tsoukiàs.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XII, 442 p. 96 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8176
|
505 |
0 |
|
|a Two Agents Competing for a Shared Machine -- Identification of a 2-Additive Bi-Capacity by Using Mathematical Programming -- How to Put through Your Agenda in Collective Binary Decisions -- Exact Approaches for Parameter Elicitation in Lexicographic Ordering -- Possible Winners in Approval Voting -- Computational Aspects of Manipulation and Control in Judgment Aggregation -- Property-Based Preferences in Abstract Argumentation -- Learning Multicriteria Utility Functions with Random Utility Models -- An Evolutionary Algorithm for the Biobjective Capacitated m-RingStar Problem -- Planning System for Emergency Services -- What Is a Decision Problem? Preliminary Statements -- Risk Information Extraction and Aggregation: Experimenting on Medline Abstracts -- How to Decrease the Degree of Envy in Allocations of Indivisible Goods -- Descriptive Profiles for Sets of Alternatives in Multiple Criteria Decision Aid -- Estimating Violation Risk for Fisheries Regulations -- Computing Convex Coverage Sets for Multi-objective Coordination Graphs -- Learning a Majority Rule Model from Large Sets of Assignment Examples -- Budgeted Personalized Incentive Approaches for Smoothing Congestion in Resource Networks -- Optimization Approaches for Solving Chance Constrained Stochastic Orienteering Problems -- Thompson Sampling for Bayesian Bandits with Resets -- Robust Optimization of Recommendation Sets with the Maximin Utility Criterion -- Possible Winner Problems on Partial Tournaments: A Parameterized Study. .
|
520 |
|
|
|a This book constitutes the thoroughly refereed conference proceedings of the Third International Conference on Algorithmic Decision Theory, ADT 2013, held in November 2013 in Bruxelles, Belgium. The 33 revised full papers presented were carefully selected from more than 70 submissions, covering preferences in reasoning and decision making, uncertainty and robustness in decision making, multi-criteria decision analysis and optimization, collective decision making, learning and knowledge extraction for decision support.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Mathematical statistics.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Probability and Statistics in Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Programming Techniques.
|
700 |
1 |
|
|a Perny, Patrice.
|e editor.
|
700 |
1 |
|
|a Pirlot, Marc.
|e editor.
|
700 |
1 |
|
|a Tsoukiàs, Alexis.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642415746
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8176
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-41575-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|