Sciweavers

166 search results - page 32 / 34
» Safe exploration for reinforcement learning
Sort
View
JSAC
2007
189views more  JSAC 2007»
13 years 8 months ago
Non-Cooperative Power Control for Wireless Ad Hoc Networks with Repeated Games
— One of the distinctive features in a wireless ad hoc network is lack of any central controller or single point of authority, in which each node/link then makes its own decision...
Chengnian Long, Qian Zhang, Bo Li, Huilong Yang, X...
KDD
2005
ACM
139views Data Mining» more  KDD 2005»
14 years 9 months ago
Reasoning about sets using redescription mining
Redescription mining is a newly introduced data mining problem that seeks to find subsets of data that afford multiple definitions. It can be viewed as a generalization of associa...
Mohammed Javeed Zaki, Naren Ramakrishnan
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 2 months ago
A Case Study of a Longstanding Online Community of Practice Involving Critical Care and Advanced Practice Nurses
The aims of this study are: (1) to examine to what extent critical care and advanced practice nurses’ participation in an online listserv constituted a community of practice, an...
Noriko Hara, Khe Foon Hew
JAIR
2011
187views more  JAIR 2011»
13 years 3 months ago
A Monte-Carlo AIXI Approximation
This paper describes a computationally feasible approximation to the AIXI agent, a universal reinforcement learning agent for arbitrary environments. AIXI is scaled down in two ke...
Joel Veness, Kee Siong Ng, Marcus Hutter, William ...
PREMI
2007
Springer
14 years 2 months ago
Self Adaptable Recognizer for Document Image Collections
Abstract. This paper presents an architecture that enables the recognizer to learn incrementally and, thereby adapt to document image collections for performance improvement. We ar...
Million Meshesha, C. V. Jawahar