Sciweavers

581 search results - page 63 / 117
» policy 2009
Sort
View
MDM
2009
Springer
121views Communications» more  MDM 2009»
14 years 3 months ago
Lazy-Update B+-Tree for Flash Devices
— With the rapid increasing capacity of flash chips, flash-aware indexing techniques are highly desirable for flash devices. The unique features of flash memory, such as the ...
Sai Tung On, Haibo Hu, Yu Li, Jianliang Xu
APLAS
2009
ACM
14 years 3 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
KCAP
2009
ACM
14 years 3 months ago
Interactively shaping agents via human reinforcement: the TAMER framework
As computational learning agents move into domains that incur real costs (e.g., autonomous driving or financial investment), it will be necessary to learn good policies without n...
W. Bradley Knox, Peter Stone
SIGCOMM
2009
ACM
14 years 3 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
14 years 1 months ago
Q-learning and Pontryagin's Minimum Principle
Abstract— Q-learning is a technique used to compute an optimal policy for a controlled Markov chain based on observations of the system controlled using a non-optimal policy. It ...
Prashant G. Mehta, Sean P. Meyn