Sciweavers

1519 search results - page 243 / 304
» A Search Log-Based Approach to Evaluation
Sort
View
96
Voted
ICIP
2006
IEEE
16 years 2 months ago
Rate-Distortion Optimal Video Transport Over IP with Bit Errors
In this paper we propose a method for video delivery over bit error channels. In particular, we propose a rate distortion optimal method for slicing and unequal error protection (...
Oztan Harmanci, A. Murat Tekalp
ICML
2006
IEEE
16 years 1 months ago
Using inaccurate models in reinforcement learning
In the model-based policy search approach to reinforcement learning (RL), policies are found using a model (or "simulator") of the Markov decision process. However, for ...
Pieter Abbeel, Morgan Quigley, Andrew Y. Ng
94
Voted
ICML
2005
IEEE
16 years 1 months ago
High speed obstacle avoidance using monocular vision and reinforcement learning
We consider the task of driving a remote control car at high speeds through unstructured outdoor environments. We present an approach in which supervised learning is first used to...
Jeff Michels, Ashutosh Saxena, Andrew Y. Ng
101
Voted
KDD
2006
ACM
208views Data Mining» more  KDD 2006»
16 years 1 months ago
Frequent subgraph mining in outerplanar graphs
In recent years there has been an increased interest in frequent pattern discovery in large databases of graph structured objects. While the frequent connected subgraph mining pro...
Tamás Horváth, Jan Ramon, Stefan Wro...
84
Voted
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 1 months ago
Mining unexpected rules by pushing user dynamics
Unexpected rules are interesting because they are either previously unknown or deviate from what prior user knowledge would suggest. In this paper, we study three important issues...
Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan