Sciweavers

1166 search results - page 211 / 234
» Negotiating Using Rewards
Sort
View
115
Voted
ATAL
2009
Springer
15 years 8 months ago
Generalized model learning for reinforcement learning in factored domains
Improving the sample efficiency of reinforcement learning algorithms to scale up to larger and more realistic domains is a current research challenge in machine learning. Model-ba...
Todd Hester, Peter Stone
114
Voted
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 8 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
124
Voted
VLSID
1998
IEEE
116views VLSI» more  VLSID 1998»
15 years 6 months ago
Synthesis of Testable RTL Designs
With several commercial tools becoming available, the high-level synthesis of applicationspeci c integrated circuits is nding wide spread acceptance in VLSI industry today. Existi...
C. P. Ravikumar, Sumit Gupta, Akshay Jajoo
EVOW
1994
Springer
15 years 6 months ago
Competitive Evolution: A Natural Approach to Operator Selection
One of the main problems in applying evolutionary optimisation methods is the choice of operators and parameter values. This paper propose a competitive evolution method, in which ...
Q. Tuan Pham
126
Voted
UAI
2003
15 years 3 months ago
On the Convergence of Bound Optimization Algorithms
Many practitioners who use EM and related algorithms complain that they are sometimes slow. When does this happen, and what can be done about it? In this paper, we study the gener...
Ruslan Salakhutdinov, Sam T. Roweis, Zoubin Ghahra...