eBooks-it.org Logo
eBooks-IT.org Inner Image

Computational and Robotic Models of the Hierarchical Organization of Behavior

Computational and Robotic Models of the Hierarchical Organization of Behavior Image

Book Details:

Publisher:Springer
Series: Springer
Author:Gianluca Baldassarre
Edition:1
ISBN-10:364239874X
ISBN-13:9783642398742
Pages:358
Published:Dec 02 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:8.87 MB

Book Description:

Current robots and other artificial systems are typically able to accomplish only one single task. Overcoming this limitation requires the development of control architectures and learning algorithms that can support the acquisition and deployment of several different skills, which in turn seems to require a modular and hierarchical organization. In this way, different modules can acquire different skills without catastrophic interference, and higher-level components of the system can solve complex tasks by exploiting the skills encapsulated in the lower-level modules. While machine learning and robotics recognize the fundamental importance of the hierarchical organization of behavior for building robots that scale up to solve complex tasks, research in psychology and neuroscience shows increasing evidence that modularity and hierarchy are pivotal organization principles of behavior and of the brain. They might even lead to the cumulative acquisition of an ever-increasing number of skills, which seems to be a characteristic of mammals, and humans in particular.This book is a comprehensive overview of the state of the art on the modeling of the hierarchical organization of behavior in animals, and on its exploitation in robot controllers. The book perspective is highly interdisciplinary, featuring models belonging to all relevant areas, including machine learning, robotics, neural networks, and computational modeling in psychology and neuroscience. The book chapters review the authors' most recent contributions to the investigation of hierarchical behavior, and highlight the open questions and most promising research directions. As the contributing authors are among the pioneers carrying out fundamental work on this topic, the book covers the most important and topical issues in the field from a computationally informed, theoretically oriented perspective. The book will be of benefit to academic and industrial researchers and graduate students in related disciplines.

Download Link:

Related Books:

Hack the Stack

Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
Hack the Stack Image
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and w...

Knowledge Engineering and Management

Proceedings of the Seventh International Conference on Intelligent Systems and Knowledge Engineering
Knowledge Engineering and Management Image
These proceedings present technical papers selected from the 2012 International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2012), held on December 15-17 in Beijing. The aim of this conference is to bring together experts from different fields of expertise to discuss the state-of-the-art in Intelligent Systems and Knowledge Engineering, and to present new findings and perspectives on future developments. The proceedings introduce current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, knowledge engineering, information retrieval, information theory, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, and natural-lang...

Computer, Informatics, Cybernetics and Applications

Proceedings of the CICA 2011
Computer, Informatics, Cybernetics and Applications Image
The Conference on Computer, Informatics, Cybernetics and Applications 2011 aims to facilitate an exchange of information on best practices for the latest research advances in the area of computer, informatics, cybernetics and applications, which mainly includes computer science and engineering, informatics, cybernetics, control systems, communication and network systems, technologies and applications, others and emerging new topics....



2007 - 2021 © eBooks-IT.org