Sciweavers

8381 search results - page 153 / 1677
» The security of machine learning
Sort
View
NIPS
1997
15 years 6 months ago
Reinforcement Learning with Hierarchies of Machines
We present a new approach to reinforcement learning in which the policies considered by the learning process are constrained by hierarchies of partially specified machines. This ...
Ronald Parr, Stuart J. Russell
ICALT
2006
IEEE
15 years 11 months ago
An Approach for Detecting Learning Styles in Learning Management Systems
Detecting the needs of learners is a challenging but essential task to be able to provide adaptivity. In this paper we present a tool that enables learning management systems (LMS...
Sabine Graf, Kinshuk
172
Voted
ICML
1998
IEEE
15 years 9 months ago
Learning to Drive a Bicycle Using Reinforcement Learning and Shaping
We present and solve a real-world problem of learning to drive a bicycle. We solve the problem by online reinforcement learning using the Sarsa(   )-algorithm. Then we solve the ...
Jette Randløv, Preben Alstrøm
96
Voted
ICALT
2009
IEEE
15 years 11 months ago
Mediating Distribution Models and Access Control for the Exchange of Learning Objects
This paper presents a learning object broker that aims to mediate and control accesses to learning objects offered by the “Learning Resource Exchange”. This broker provides a u...
Jean-Noel Colin, Tien-Dung Le, David Massart
COLT
2008
Springer
15 years 6 months ago
Learning from Collective Behavior
Inspired by longstanding lines of research in sociology and related fields, and by more recent largepopulation human subject experiments on the Internet and the Web, we initiate a...
Michael Kearns, Jennifer Wortman