Sciweavers

1016 search results - page 60 / 204
» Explore or Exploit
Sort
View
ALIFE
2006
13 years 9 months ago
Through the Interaction of Neutral and Adaptive Mutations, Evolutionary Search Finds a Way
An evolutionary system that supports the interaction of neutral and adaptive mutations is investigated. Experimental results on a Boolean function and needle-in-haystack problems s...
Tina Yu, Julian Francis Miller
VIROLOGY
2008
95views more  VIROLOGY 2008»
13 years 9 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
AAMAS
1998
Springer
13 years 8 months ago
Real-Time Search for Autonomous Agents and Multiagent Systems
Since real-time search provides an attractive framework for resource-bounded problem solving, this paper extends the framework for autonomous agents and for a multiagent world. To ...
Toru Ishida
ICRA
2010
IEEE
162views Robotics» more  ICRA 2010»
13 years 7 months ago
Comparing and modeling distributed control strategies for miniature self-assembling robots
— We propose two contrasting approaches to the scalable distributed control of a swarm of self-assembling miniaturized robots, specifically the formation of chains of a desired ...
William C. Evans, Grégory Mermoud, Alcherio...
JMLR
2010
125views more  JMLR 2010»
13 years 3 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...