Sciweavers

4345 search results - page 696 / 869
» Relational Reinforcement Learning
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 10 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
JMLR
2010
125views more  JMLR 2010»
14 years 10 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...
TCIAIG
2010
14 years 10 months ago
Modeling Player Experience for Content Creation
In this paper, we use computational intelligence techniques to built quantitative models of player experience for a platform game. The models accurately predict certain key affecti...
Christopher Pedersen, Julian Togelius, Georgios N....
TSP
2010
14 years 9 months ago
Testing stationarity with surrogates: a time-frequency approach
An operational framework is developed for testing stationarity relatively to an observation scale, in both stochastic and deterministic contexts. The proposed method is based on a ...
Pierre Borgnat, Patrick Flandrin, Paul Honeine, C&...
ICASSP
2011
IEEE
14 years 6 months ago
Proportionate-type normalized least mean square algorithm with gain allocation motivated by minimization of mean-square-weight d
In previous work, a water-filling algorithm was proposed which sought to minimize the mean square error (MSE) at any given time by optimally choosing the gains (i.e. step-sizes) ...
Kevin T. Wagner, Milos Doroslovacki