نتایج جستجو برای: sequential exploration approach1
تعداد نتایج: 169739 فیلتر نتایج به سال:
Motivated by applications in Dynamic Spectrum Access Networks, we focus on a system in which a few agents are engaged in a costly individual exploration process where each agent’s benefit is determined according to the minimum obtained value. Such an exploration pattern is applicable to many systems, including shipment and travel planning. This paper formally introduces and analyzes a sequentia...
Sequential decision making problems often require an agent to act in an environment where data is noisy or not fully observed. The agent will have to learn how different actions relate to different rewards, and must therefore balance the need to explore and exploit in an effective strategy. In this report, sequential decision making problems are considered through extensions of the multi-armed ...
In this paper, we empirically explore the effects of various kinds of skip connections in stacked bidirectional LSTMs for sequential tagging. We investigate three kinds of skip connections connecting to LSTM cells: (a) skip connections to the gates, (b) skip connections to the internal states and (c) skip connections to the cell outputs. We present comprehensive experiments showing that skip co...
We show how the state space exploration tool VeriSoft can be used to analyze sequential and parallel C/C++ programs with respect to their transition traces. The analysis determines whether or not a given program can behave as prescribed by some nite transition trace. VeriSoft's exploration is always bounded by a user-speciied, nite depth parameter. Therefore, our analysis is guaranteed to termi...
We provide a new characterization of scheduling nondeterminism by allowing deterministic schedulers to delay their next-scheduled task. By limiting the number of delays that an otherwise-deterministic scheduler is allowed, a bounded-exploration of a concurrent program can be done efficiently—by reduction to an equivalent exploration of a sequential program—and robustly—i.e., not dependent on bo...
Handwriting is individualistic. The uniqueness of shape and style of handwriting can be used to identify the significant features in authenticating the author of writing. Acquiring these significant features leads to an important research in Writer Identification domain where to find the unique features of individual which also known as Individuality of Handwriting. This paper proposes an impro...
Monte-Carlo planning has been proven successful in many sequential decision-making settings, but it suffers from poor exploration when the rewards are sparse. In this paper, we improve exploration in UCT by generalizing across similar states using a given distance metric. We show that this algorithm, like UCT, converges asymptotically to the optimal action. When the state space does not have a ...
Recent research in robot exploration and mapping has focused on sampling hotspot fields, which often arise in environmental and ecological sensing applications. Such a hotspot field is characterized by continuous, positively skewed, spatially correlated measurements with the hotspots exhibiting extreme measurements and much higher spatial variability than the rest of the field. To map a hotspot...
Integration between business planning and information systems planning has been found to have a significant impact on the extent of information systems contribution to organizational performance. Based on a content analysis of strategic IS/IT plans in Norway, the extent of integration was studied. This paper evaluates ten integration mechanisms and four integration stages. Most of the organizat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید