Sciweavers

882 search results - page 17 / 177
» Visibility-driven transfer functions
Sort
View
RAS
2010
131views more  RAS 2010»
13 years 6 months ago
Probabilistic Policy Reuse for inter-task transfer learning
Policy Reuse is a reinforcement learning technique that efficiently learns a new policy by using past similar learned policies. The Policy Reuse learner improves its exploration b...
Fernando Fernández, Javier García, M...
TELSYS
2002
126views more  TELSYS 2002»
13 years 7 months ago
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs
Formal description techniques, verification methods, and their tool-based automated application meanwhile provide valuable support for the formal analysis of communication protocol...
Peter Herrmann, Heiko Krumm, Olaf Drögehorn, ...
ECCV
2008
Springer
14 years 9 months ago
Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks
Abstract. Building visual recognition models that adapt across different domains is a challenging task for computer vision. While feature-learning machines in the form of hierarchi...
Amr Ahmed, Kai Yu, Wei Xu, Yihong Gong, Eric P. Xi...
CEC
2009
IEEE
14 years 2 months ago
Multi-start JADE with knowledge transfer for numerical optimization
— JADE is a recent variant of Differential Evolution (DE) for numerical optimization, which has been reported to obtain some promising results in experimental study. However, we ...
Fei Peng, Ke Tang, Guoliang Chen, Xin Yao
MM
2009
ACM
177views Multimedia» more  MM 2009»
14 years 2 months ago
Transfer non-metric measures into metric for similarity search
Similarity search is widely used in multimedia retrieval systems to find the most similar ones for a given object. Some similarity measures, however, are not metric, leading to e...
Danzhou Liu, Kien A. Hua