Sciweavers

585 search results - page 24 / 117
» Strategy Logic
Sort
View
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 7 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
141
Voted
FMCO
2004
Springer
120views Formal Methods» more  FMCO 2004»
15 years 7 months ago
A Dynamic Binding Strategy for Multiple Inheritance and Asynchronously Communicating Objects
This paper considers an integration of asynchronous communication, virtual binding, and multiple inheritance. Object orientation is the leading paradigm for concurrent and distribu...
Einar Broch Johnsen, Olaf Owe
111
Voted
CAMAD
2006
IEEE
15 years 5 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
ECIS
2004
15 years 3 months ago
Qualitative Analysis Software applied to IS Research - Developing a coding strategy
In the past two decades, the IS research community underwent an intensive debate and fought hard to legitimise interpretive and qualitative research paradigms. Now that the war is...
Brian O'Flaherty, Jason Whalley
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
15 years 1 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...