• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 826
Next 10 →

A Phenomenological Exploration of Adaptation in a Polycontextual Work Environment

by P. C. van Fenema, S. Qureshi , 2004
"... The rise of new ways of working through the use of information and communication technology brings about new phenomena that are powerful in the effects that they have on people. The potency of phenomenology lies in its philosophical simplicity and it provides the researcher with the ability to stud ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
studied using phenomenology, this paper concludes with a model of adaptation in polycontextual work environments.

Formalising trust as a computational concept

by Stephen Paul Marsh , 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract - Cited by 529 (6 self) - Add to MetaCart
exploration of the possibilities of future work in the area. Summary 1. Overview This thesis presents an overview of trust as a social phenomenon and discusses it formally. It argues that trust is: • A means for understanding and adapting to the complexity of the environment. • A means of providing added

Finite-time analysis of the multiarmed bandit problem

by Peter Auer, Paul Fischer, Jyrki Kivinen - Machine Learning , 2002
"... Abstract. Reinforcement learning policies face the exploration versus exploitation dilemma, i.e. the search for a balance between exploring the environment to find profitable actions while taking the empirically best action as often as possible. A popular measure of a policy’s success in addressing ..."
Abstract - Cited by 817 (15 self) - Add to MetaCart
Abstract. Reinforcement learning policies face the exploration versus exploitation dilemma, i.e. the search for a balance between exploring the environment to find profitable actions while taking the empirically best action as often as possible. A popular measure of a policy’s success in addressing

Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments

by Ramon Caceres, Liviu Iftode - IEEE Journal on Selected Areas in Communications , 1994
"... We explore the performance of reliable data communication in mobile computing environments. Motion across wireless cell boundaries causes increased delays and packet losses while the network learns how to route data to a host's new location. Reliable transport protocols like TCP interpret these ..."
Abstract - Cited by 314 (2 self) - Add to MetaCart
We explore the performance of reliable data communication in mobile computing environments. Motion across wireless cell boundaries causes increased delays and packet losses while the network learns how to route data to a host's new location. Reliable transport protocols like TCP interpret

Indicators for Social and Economic Coping Capacity - Moving Toward a Working Definition of Adaptive Capacity”, Wesleyan-CMU Working Paper.

by Gary Yohe , Richard S J Tol , Gary Yohe , 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract - Cited by 109 (14 self) - Add to MetaCart
in the mean or variability in any variable that defines a system's environment. Moreover, the care with which they assessed the broader adaptation literature in their approach to climate issues means that it is sufficient for present purposes simply to review their work with a careful eye toward

Genetic algorithms in noisy environments

by J. Michael Fitzpatrick, John J. Grefenstette - Machine Learning 3 , 1988
"... Abstract. Genetic algorithms are adaptive search techniques which have been used to learn high-performance knowledge structures in reactive environments that pro-vide information in the form of payoff. In general, payoff can be viewed as a noisy function of the structure being evaluated, and the lea ..."
Abstract - Cited by 110 (2 self) - Add to MetaCart
, and the learning task can be viewed as an optimization problem in a noisy environment. Previous studies have shown that genetic algorithms can perform effectively in the presence of noise. This work ex-plores in detail the tradeoffs between the amount of effort spent on evaluating each structure and the number

Genetic algorithms for tracking changing environments

by Helen G. Cobb - Proceedings of the Fifth International Conference on Genetic Algorithms , 1993
"... In this paper, we explore the use of alternative mutation strategies as a means of increasing diversity so that the GA can track the optimum of a changing environment. This paper contrasts three different strategies: the Standard GA using a constant level of mutation, a mechanism called Random Immig ..."
Abstract - Cited by 113 (1 self) - Add to MetaCart
In this paper, we explore the use of alternative mutation strategies as a means of increasing diversity so that the GA can track the optimum of a changing environment. This paper contrasts three different strategies: the Standard GA using a constant level of mutation, a mechanism called Random

Real-Time Randomized Path Planning for Robot Navigation

by James Bruce, Manuela Veloso , 2002
"... Mobile robots often find themselves in a situation where they must find a trajectory to another position in their environment, subject to constraints posed by obstacles and the capabilities of the robot itself. This is the problem of planning a path through a continuous domain, for which several app ..."
Abstract - Cited by 133 (23 self) - Add to MetaCart
of previous RRT work, the waypoint cache and adaptive cost penalty search, which improve replanning efficiency and the quality of generated paths. ERRT is successfully applied to a real-time multi-robot system. Results demonstrate that ERRT is significantly more efficient for replanning than a basic RRT

Adapting to the task environment: Explorations in expected value

by Wayne D. Gray, Michael J. Schoelles, Chris R. Sims - Cognitive Systems Research , 2005
"... Small variations in how a task is designed can lead humans to trade off one set of strategies for another. In this paper we discuss our failure to model such tradeoffs in the Blocks World task using ACT-RÕs default mechanism for selecting the best production among competing productions. ACT-RÕs sele ..."
Abstract - Cited by 7 (4 self) - Add to MetaCart
, it tends to produce models that adapt to their task environment about as fast as humans adapt. (This congruence with human behavior is in marked contrast to other popular ways of computing the utility of alternative choices; for example, Reinforcement Learning or most Connectionist learning methods.) We

A dynamic model of social network formation.

by Brian Skyrms , Robin Pemantle - Proc. Nat. Acad. Sci. U.S.A. , 2000
"... We consider a dynamic social network model in which agents play repeated games in pairings determined by a stochastically evolving social network. Individual agents begin to interact at random, with the interactions modeled as games. The game payoffs determine which interactions are reinforced, and ..."
Abstract - Cited by 120 (9 self) - Add to MetaCart
in the somewhat more antagonistic situation of bargaining to split a fixed payoff, or attempting to escape the undesirable but compelling equilibrium of a Prisoner's Dilemma. As time progresses, the players adapt their strategies, perhaps incorporating randomness in their decision rules, to suit
Next 10 →
Results 1 - 10 of 826
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University