• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 59,465
Next 10 →

Table 2: State variables for RL Based Agents

in Using Model-Based Reflection to Guide Reinforcement Learning
by Patrick Ulam, Ashok Goel, Joshua Jones, William Murdock 2005
"... In PAGE 4: ...3 Pure Reinforcement Learning Agent The third agent used a pure reinforcement learning strategy for adaptation implemented via Q-Learning. The state space encoding used by this agent is a set of nine binary variables as seen in Table2 . This allows a state space of 512 distinct states.... In PAGE 5: ... This essentially makes several smaller reinforcement learn- ing problems. Table2 shows the states that are associated with each sub-task. The Evaluate-External task is associated with three binary state variables.... ..."
Cited by 3

Table 1. Comparison of security models with provable correctness.

in On Correctness and Privacy in Distributed Mechanisms
by Felix Brandt, Tuomas Sandholm
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack... ..."

Table 1. Comparison of security models with provable correctness.

in On Correctness and Privacy in Distributed Mechanisms
by Felix Brandt, Tuomas Sandholm
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack... ..."

Table 1. Comparison of security models with provable correctness

in On Correctness and Privacy in Distributed Mechanisms
by Felix Brandt, Tuomas Sandholm
"... In PAGE 12: ... Furthermore, the decentralization allows for the provable correctness of randomized mechanisms. Table1 summarizes the pro- posed models for secure mechanism execution. Even though the centralized models provide questionable privacy, there are certainly applications in which they would be favored over the decentralized models due to practical considerations (efficiency, lack of communication between agents, robustness, etc.... ..."

Table 1. Comparison of Efficiency and Security Goals of TDH1 and some other Static Provably Secure GKE Protocols

in Group Key Exchange Secure against Strong Corruptions
by unknown authors
"... In PAGE 12: ...Table1 we compare TDH1 protocol with several well-known provably secure GKE protocols in terms of their performance and security goals. Our comparison is done based on the security arguments Table 1.... ..."

Table 1: A taxonomy of latent structure models Observed

in Parameter Estimation in Latent Structure Models
by A. P. Dunmur, D. M. Titterington 1996
"... In PAGE 2: ...Table1 , which also appears in Henry (1983). Table 1: A taxonomy of latent structure models Observed... ..."

Table 1. Table 1. Latent variables and respective observed variables Latent variables (factors) Observed variables (sub-factors)

in Information and communication technology learning in the classroom: The influence of students
by Robert F. Cavanagh, Joseph T. Romanoski, Peter S. Reynolds

Table 1: Average life difference State-Mach. Trad. RL Adaptive RL

in Universidade Federal de Pernambuco (UFPE) – Centro de Informática (CIn)
by Gustavo Danzi, De Andrade, Hugo Pimentel Santana, Av. Prof, Luís Freire, Cidade Universitária, Cep Recife/pe/brazil
"... In PAGE 6: ... The average performance of the agent shows that most of the fights end with a small difference of life, meaning that both fighters had similar performance. Table1 shows the average life difference for each agent. Table 1: Average life difference State-Mach.... ..."

Table 3: Efficiencies, number of events observed in data and expected from Monte Carlo for final states with two leptons and two jets.

in Searches for R--Parity Violating Decays of Sfermions and Gauginos via
by Couplings At, Gauginos Via
"... In PAGE 6: ... Distributions of some event variables are shown in Figure 1. The number of events observed in data are shown in Table3 . The efficiencies range between 31 and... ..."

Table 3: RMS error observed in tested profiles Profile PID RL

in Intelligent Control of Closed-Loop Sedation in Simulated ICU Patients
by Brett L. Moore , Eric D. Sinzinger, Todd M. Quasny, Larry D. Pyeatt 2004
Cited by 1
Next 10 →
Results 1 - 10 of 59,465
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University