default search action
Volkan Ustun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Timothy Aris, Volkan Ustun, Rajay Kumar:
Training Reinforcement Learning Agents to React to an Ambush for Military Simulations. FLAIRS 2024 - [c25]Caleb Koresh, Volkan Ustun, Rajay Kumar, Timothy Aris:
Improving Reinforcement Learning Experiments in Unity through Waypoint Utilization. FLAIRS 2024 - [c24]Lixing Liu, Volkan Ustun, Rajay Kumar:
Leveraging Organizational Hierarchy to Simplify Reward Design in Cooperative Multi-agent Reinforcement Learning. FLAIRS 2024 - [c23]Nikolos Gurney, David V. Pynadath, Volkan Ustun:
Spontaneous Theory of Mind for Artificial Intelligence. HCI (1) 2024: 60-75 - [c22]Volkan Ustun, Ronit Jorvekar, Nikolos Gurney, David V. Pynadath, Yunzhe Wang:
Assessing Routing Decisions of Search and Rescue Teams in Service of an Artificial Social Intelligence Agent. ICAART (1) 2024: 313-320 - [i3]Nikolos Gurney, David V. Pynadath, Volkan Ustun:
Spontaneous Theory of Mind for Artificial Intelligence. CoRR abs/2402.13272 (2024) - 2023
- [c21]David V. Pynadath, Nikolos Gurney, Sarah Kenny, Rajay Kumar, Stacy C. Marsella, Haley Matuszak, Hala Mostafa, Pedro Sequeira, Volkan Ustun, Peggy Wu:
Effectiveness of Teamwork-Level Interventions through Decision-Theoretic Reasoning in a Minecraft Search-and-Rescue Task. AAMAS 2023: 2334-2336 - [c20]Timothy Aris, Volkan Ustun, Rajay Kumar:
Learning to Take Cover with Navigation-Based Waypoints via Reinforcement Learning. FLAIRS 2023 - [c19]Viswanath Chadalapaka, Volkan Ustun, Lixing Liu:
Leveraging Graph Networks to Model Environments in Reinforcement Learning. FLAIRS 2023 - 2022
- [c18]Arno Hartholt, Ed Fast, Andrew Leeds, Kevin Kim, Andrew Gordon, Kyle McCullough, Volkan Ustun, Sharon Mozgai:
Demonstrating the Rapid Integration & Development Environment (RIDE): Embodied Conversational Agent (ECA) and Multiagent Capabilities. AAMAS 2022: 1902-1904 - [c17]Timothy Aris, Volkan Ustun, Rajay Kumar:
Learning to Take Cover on Geo-Specific Terrains via Reinforcement Learning. FLAIRS 2022 - 2021
- [c16]Jincheng Zhou, Volkan Ustun:
PySigma: Towards Enhanced Grand Unification for the Sigma Cognitive Architecture. AGI 2021: 355-366 - [c15]Nikolos Gurney, Stacy Marsella, Volkan Ustun, David V. Pynadath:
Operationalizing Theories of Theory of Mind: A Survey. ToM for Teams 2021: 3-20 - [c14]Yunzhe Wang, Nikolos Gurney, Jincheng Zhou, David V. Pynadath, Volkan Ustun:
Route Optimization in Service of a Search and Rescue Artificial Social Intelligence Agent. ToM for Teams 2021: 220-228 - [c13]Lixing Liu, Nikolos Gurney, Kyle McCullough, Volkan Ustun:
Graph Neural Network Based Behavior Prediction to Support Multi-Agent Reinforcement Learning in Military Training Simulations. WSC 2021: 1-12 - [i2]Volkan Ustun, Rajay Kumar, Adam Reilly, Seyed Sajjadi, Andrew Miller:
Adaptive Synthetic Characters for Military Training. CoRR abs/2101.02185 (2021) - [i1]Volkan Ustun, Paul S. Rosenbloom, Seyed Sajjadi, Jeremy Nuttal:
Controlling Synthetic Characters in Simulations: A Case for Cognitive Architectures and Sigma. CoRR abs/2101.02231 (2021)
2010 – 2019
- 2016
- [j2]Paul S. Rosenbloom, Abram Demski, Volkan Ustun:
The Sigma Cognitive Architecture and System: Towards Functionally Elegant Grand Unification. J. Artif. Gen. Intell. 7(1): 1-103 (2016) - [c12]Paul S. Rosenbloom, Abram Demski, Volkan Ustun:
Rethinking Sigma's Graphical Architecture: An Extension to Neural Networks. AGI 2016: 84-94 - 2015
- [c11]Paul S. Rosenbloom, Jonathan Gratch, Volkan Ustun:
Towards Emotion in Sigma: From Appraisal to Attention. AGI 2015: 142-151 - [c10]Cody Kommers, Volkan Ustun, Abram Demski, Paul S. Rosenbloom:
Hierarchical Reasoning with Distributed Vector Representations. CogSci 2015 - [c9]Volkan Ustun, Paul S. Rosenbloom:
Towards Adaptive, Interactive Virtual Humans in Sigma. IVA 2015: 98-108 - [c8]Justin Garten, Kenji Sagae, Volkan Ustun, Morteza Dehghani:
Combining Distributed Vector Representations for Words. VS@HLT-NAACL 2015: 95-101 - [c7]Volkan Ustun, Paul S. Rosenbloom, Julia Kim, Lingshan Li:
Building high fidelity human behavior models in the Sigma cognitive architecture. WSC 2015: 3124-3125 - 2014
- [c6]Volkan Ustun, Paul S. Rosenbloom, Kenji Sagae, Abram Demski:
Distributed Vector Representations of Words in the Sigma Cognitive Architecture. AGI 2014: 196-207 - 2011
- [j1]Leon F. McGinnis, Edward Huang, Ky Sang Kwon, Volkan Ustun:
Ontologies and simulation: a practical approach. J. Simulation 5(3): 190-201 (2011)
2000 – 2009
- 2009
- [c5]Leon F. McGinnis, Volkan Ustun:
A Simple Example of SysML-driven Simulation. WSC 2009: 1703-1710 - 2008
- [c4]Volkan Ustun, Jeffrey S. Smith:
Mental simulation for creating realistic behavior in physical security systems simulation. WSC 2008: 879-885 - 2006
- [c3]Volkan Ustun, Levent Yilmaz, Jeffrey S. Smith:
A conceptual model for agent-based simulation of physical security systems. ACM Southeast Regional Conference 2006: 365-370 - 2005
- [c2]Volkan Ustun, Haluk Yapicioglu, Skylab R. Gupta, Abishek Ramesh, Jeffrey S. Smith:
A conceptual architecture for static features in physical security simulation. WSC 2005: 958-964 - 2004
- [c1]Baybora Aksoy, Volkan Ustun, Jeffrey S. Smith:
Localization Using Discrete Event Simulation. WSC 2004: 989-993
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint