Sciweavers

1167 search results - page 136 / 234
» policy 2007
Sort
View
NIPS
1997
15 years 6 months ago
Reinforcement Learning with Hierarchies of Machines
We present a new approach to reinforcement learning in which the policies considered by the learning process are constrained by hierarchies of partially specified machines. This ...
Ronald Parr, Stuart J. Russell
SEBD
1997
158views Database» more  SEBD 1997»
15 years 6 months ago
Indexing Metric Spaces with M-Tree
M-tree is a dynamic access method suitable to index generic “metric spaces”, where the function used to compute the distance between any two objects satisfies the positivity, ...
Paolo Ciaccia, Marco Patella, Fausto Rabitti, Pave...
SEC
1997
15 years 6 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
NIPS
1994
15 years 6 months ago
Generalization in Reinforcement Learning: Safely Approximating the Value Function
To appear in: G. Tesauro, D. S. Touretzky and T. K. Leen, eds., Advances in Neural Information Processing Systems 7, MIT Press, Cambridge MA, 1995. A straightforward approach to t...
Justin A. Boyan, Andrew W. Moore
ADHOC
2007
91views more  ADHOC 2007»
15 years 4 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves