Sciweavers

4345 search results - page 696 / 869
» Relational Reinforcement Learning
Sort
View
104
Voted
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 5 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
90
Voted
JMLR
2010
125views more  JMLR 2010»
14 years 5 months ago
Regret Bounds for Gaussian Process Bandit Problems
Bandit algorithms are concerned with trading exploration with exploitation where a number of options are available but we can only learn their quality by experimenting with them. ...
Steffen Grünewälder, Jean-Yves Audibert,...
77
Voted
TCIAIG
2010
14 years 4 months ago
Modeling Player Experience for Content Creation
In this paper, we use computational intelligence techniques to built quantitative models of player experience for a platform game. The models accurately predict certain key affecti...
Christopher Pedersen, Julian Togelius, Georgios N....
TSP
2010
14 years 4 months ago
Testing stationarity with surrogates: a time-frequency approach
An operational framework is developed for testing stationarity relatively to an observation scale, in both stochastic and deterministic contexts. The proposed method is based on a ...
Pierre Borgnat, Patrick Flandrin, Paul Honeine, C&...
ICASSP
2011
IEEE
14 years 1 months ago
Proportionate-type normalized least mean square algorithm with gain allocation motivated by minimization of mean-square-weight d
In previous work, a water-filling algorithm was proposed which sought to minimize the mean square error (MSE) at any given time by optimally choosing the gains (i.e. step-sizes) ...
Kevin T. Wagner, Milos Doroslovacki