Sciweavers

1016 search results - page 6 / 204
» Explore or Exploit
Sort
View
CDC
2009
IEEE
160views Control Systems» more  CDC 2009»
13 years 4 months ago
Exploring and exploiting routing opportunities in wireless ad-hoc networks
Abstract--In this paper, d-AdaptOR, a distributed opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement lear...
Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi,...
ICDM
2009
IEEE
254views Data Mining» more  ICDM 2009»
13 years 4 months ago
Explore/Exploit Schemes for Web Content Optimization
Deepak Agarwal, Bee-Chung Chen, Pradheep Elango
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 1 months ago
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks
This paper extends the analogies employed in the development of quantum-inspired evolutionary algorithms by proposing quantum-inspired Hadamard walks, called QHW. A novel quantum-...
Sisir Koppaka, Ashish Ranjan Hota
AAAI
2011
12 years 7 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier