Sciweavers

1016 search results - page 60 / 204
» Explore or Exploit
Sort
View
ALIFE
2006
15 years 3 months ago
Through the Interaction of Neutral and Adaptive Mutations, Evolutionary Search Finds a Way
An evolutionary system that supports the interaction of neutral and adaptive mutations is investigated. Experimental results on a Boolean function and needle-in-haystack problems s...
Tina Yu, Julian Francis Miller
VIROLOGY
2008
95views more  VIROLOGY 2008»
15 years 3 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
AAMAS
1998
Springer
15 years 3 months ago
Real-Time Search for Autonomous Agents and Multiagent Systems
Since real-time search provides an attractive framework for resource-bounded problem solving, this paper extends the framework for autonomous agents and for a multiagent world. To ...
Toru Ishida
ICRA
2010
IEEE
162views Robotics» more  ICRA 2010»
15 years 1 months ago
Comparing and modeling distributed control strategies for miniature self-assembling robots
— We propose two contrasting approaches to the scalable distributed control of a swarm of self-assembling miniaturized robots, specifically the formation of chains of a desired ...
William C. Evans, Grégory Mermoud, Alcherio...
JMLR
2010
125views more  JMLR 2010»
14 years 10 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...