Sciweavers

192 search results - page 26 / 39
» An autonomous explore exploit strategy
Sort
View
ECWEB
2005
Springer
149views ECommerce» more  ECWEB 2005»
14 years 2 months ago
Architecture of a Semantic XPath Processor. Application to Digital Rights Management
This work describes a novel strategy for designing an XPath processor that acts over an RDF mapping of XML. We use a modelmapping approach to represent instances of XML and XML Sch...
Rubén Tous, Roberto García, Eva Rodr...
WEBI
2009
Springer
14 years 1 months ago
Collaborative Semantic Structuring of Folksonomies
The advent of tagging and folksonomies for organizing shared resources on the social Web brought promising opportunities to help communities of users capture their knowledge. Howe...
Freddy Limpens, Fabien L. Gandon, Michel Buffa
ICA
2010
Springer
13 years 9 months ago
Double Sparsity: Towards Blind Estimation of Multiple Channels
We propose a framework for blind multiple filter estimation from convolutive mixtures, exploiting the time-domain sparsity of the mixing filters and the disjointness of the sources...
Prasad Sudhakar, Simon Arberet, Rémi Gribon...
JMLR
2010
125views more  JMLR 2010»
13 years 3 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...
ECAI
2006
Springer
14 years 20 days ago
Agents with Anticipatory Behaviors: To Be Cautious in a Risky Environment
This work presents some anticipatory mechanisms in an agent architecture, modeling affective behaviours as effects of surprise. Through experiment discussion, the advantages of bec...
Cristiano Castelfranchi, Rino Falcone, Michele Piu...