Sciweavers

1455 search results - page 5 / 291
» Exploiting Myopic Learning
Sort
View
FC
2010
Springer
132views Cryptology» more  FC 2010»
15 years 1 months ago
A Learning-Based Approach to Reactive Security
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the r...
Adam Barth, Benjamin I. P. Rubinstein, Mukund Sund...
ECAI
2006
Springer
15 years 1 months ago
Strategic Foresighted Learning in Competitive Multi-Agent Games
We describe a generalized Q-learning type algorithm for reinforcement learning in competitive multi-agent games. We make the observation that in a competitive setting with adaptive...
Pieter Jan't Hoen, Sander M. Bohte, Han La Poutr&e...
IJCAI
2007
14 years 11 months ago
Online Learning and Exploiting Relational Models in Reinforcement Learning
In recent years, there has been a growing interest in using rich representations such as relational languages for reinforcement learning. However, while expressive languages have ...
Tom Croonenborghs, Jan Ramon, Hendrik Blockeel, Ma...
83
Voted
TLT
2008
149views more  TLT 2008»
14 years 9 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...