Sciweavers

104 search results - page 2 / 21
» Exploitation and exploration in a performance based contextu...
Sort
View
ICML
2008
IEEE
14 years 5 months ago
Exploration scavenging
We examine the problem of evaluating a policy in the contextual bandit setting using only observations collected during the execution of another policy. We show that policy evalua...
John Langford, Alexander L. Strehl, Jennifer Wortm...
AAIM
2005
Springer
110views Algorithms» more  AAIM 2005»
13 years 10 months ago
Dynamically Updating the Exploiting Parameter in Improving Performance of Ant-Based Algorithms
Abstract. The utilization of pseudo-random proportional rule to balance between the exploitation and exploration of the search process was shown in Ant Colony System (ACS) algorith...
Hoang Trung Dinh, Abdullah Al Mamun, Hieu T. Dinh
WWW
2009
ACM
14 years 5 months ago
Competitive analysis from click-through log
Existing keyword suggestion tools from various search engine companies could automatically suggest keywords related to the advertisers' products or services, counting in simp...
Gang Wang, Jian Hu, Yunzhang Zhu, Hua Li, Zheng Ch...
ICDE
2012
IEEE
227views Database» more  ICDE 2012»
11 years 7 months ago
Temporal Analytics on Big Data for Web Advertising
—“Big Data” in map-reduce (M-R) clusters is often fundamentally temporal in nature, as are many analytics tasks over such data. For instance, display advertising uses Behavio...
Badrish Chandramouli, Jonathan Goldstein, Songyun ...
CDC
2009
IEEE
160views Control Systems» more  CDC 2009»
13 years 2 months ago
Exploring and exploiting routing opportunities in wireless ad-hoc networks
Abstract--In this paper, d-AdaptOR, a distributed opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement lear...
Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi,...