Results 1 - 10
of
59,465
Table 2: State variables for RL Based Agents
2005
"... In PAGE 4: ...3 Pure Reinforcement Learning Agent The third agent used a pure reinforcement learning strategy for adaptation implemented via Q-Learning. The state space encoding used by this agent is a set of nine binary variables as seen in Table2 . This allows a state space of 512 distinct states.... In PAGE 5: ... This essentially makes several smaller reinforcement learn- ing problems. Table2 shows the states that are associated with each sub-task. The Evaluate-External task is associated with three binary state variables.... ..."
Cited by 3
Table 1. Comparison of security models with provable correctness.
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack... ..."
Table 1. Comparison of security models with provable correctness.
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack... ..."
Table 1. Comparison of security models with provable correctness
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack of communication between agents, robustness, etc.... ..."
Table 1. Comparison of Efficiency and Security Goals of TDH1 and some other Static Provably Secure GKE Protocols
"... In PAGE 12: ...Table1 we compare TDH1 protocol with several well-known provably secure GKE protocols in terms of their performance and security goals. Our comparison is done based on the security arguments Table 1.... ..."
Table 1: A taxonomy of latent structure models Observed
1996
"... In PAGE 2: ...Table1 , which also appears in Henry (1983). Table 1: A taxonomy of latent structure models Observed... ..."
Table 1. Table 1. Latent variables and respective observed variables Latent variables (factors) Observed variables (sub-factors)
Table 1: Average life difference State-Mach. Trad. RL Adaptive RL
"... In PAGE 6: ... The average performance of the agent shows that most of the fights end with a small difference of life, meaning that both fighters had similar performance. Table1 shows the average life difference for each agent. Table 1: Average life difference State-Mach.... ..."
Table 3: Efficiencies, number of events observed in data and expected from Monte Carlo for final states with two leptons and two jets.
"... In PAGE 6: ... Distributions of some event variables are shown in Figure 1. The number of events observed in data are shown in Table3 . The efficiencies range between 31 and... ..."
Table 3: RMS error observed in tested profiles Profile PID RL
2004
Cited by 1
Results 1 - 10
of
59,465