Sciweavers

1016 search results - page 65 / 204
» Explore or Exploit
Sort
View
VLDB
2001
ACM
102views Database» more  VLDB 2001»
14 years 1 months ago
Form-Based Proxy Caching for Database-Backed Web Sites
We explore a new proxy-caching framework that exploits the query semantics of HTML forms. We identify a common class of form-based queries, and study two representative caching sc...
Qiong Luo, Jeffrey F. Naughton
CORR
2012
Springer
216views Education» more  CORR 2012»
12 years 4 months ago
Fractional Moments on Bandit Problems
Reinforcement learning addresses the dilemma between exploration to find profitable actions and exploitation to act according to the best observations already made. Bandit proble...
Ananda Narayanan B., Balaraman Ravindran
GECCO
2005
Springer
141views Optimization» more  GECCO 2005»
14 years 2 months ago
Local and global order 3/2 convergence of a surrogate evolutionary algorithm
A Quasi-Monte-Carlo method based on the computation of a surrogate model of the fitness function is proposed, and its convergence at super-linear rate 3/2 is proved under rather ...
Anne Auger, Marc Schoenauer, Olivier Teytaud
GECCO
2000
Springer
131views Optimization» more  GECCO 2000»
14 years 21 days ago
A Genetic Algorithm with Tabu Search for Multimodal and Multiobjective Function Optimization
The integration of genetic algorithms (GAs) and tabu search is one of traditional problems in function optimization in the GA literature. However, most proposed methods have utili...
Setsuya Kurahashi, Takao Terano
ICDM
2005
IEEE
137views Data Mining» more  ICDM 2005»
14 years 2 months ago
Leveraging Relational Autocorrelation with Latent Group Models
The presence of autocorrelation provides a strong motivation for using relational learning and inference techniques. Autocorrelation is a statistical dependence between the values...
Jennifer Neville, David Jensen