Sciweavers

24680 search results - page 4573 / 4936
» Learning
Sort
View
BWCCA
2010
14 years 10 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
CDC
2010
IEEE
136views Control Systems» more  CDC 2010»
14 years 10 months ago
Pathologies of temporal difference methods in approximate dynamic programming
Approximate policy iteration methods based on temporal differences are popular in practice, and have been tested extensively, dating to the early nineties, but the associated conve...
Dimitri P. Bertsekas
COGSR
2011
71views more  COGSR 2011»
14 years 10 months ago
Psychological models of human and optimal performance in bandit problems
In bandit problems, a decision-maker must choose between a set of alternatives, each of which has a fixed but unknown rate of reward, to maximize their total number of rewards ov...
Michael D. Lee, Shunan Zhang, Miles Munro, Mark St...
112
Voted
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 10 months ago
Total variation regularization for fMRI-based prediction of behaviour
—While medical imaging typically provides massive amounts of data, the extraction of relevant information for predictive diagnosis remains a difficult challenge. Functional MRI ...
Vincent Michel, Alexandre Gramfort, Gaël Varo...
CORR
2011
Springer
230views Education» more  CORR 2011»
14 years 10 months ago
Computational Rationalization: The Inverse Equilibrium Problem
Modeling the behavior of imperfect agents from a small number of observations is a difficult, but important task. In the singleagent decision-theoretic setting, inverse optimal co...
Kevin Waugh, Brian Ziebart, J. Andrew Bagnell
« Prev « First page 4573 / 4936 Last » Next »