Information Technology Reference
In-Depth Information
10. Pelikan, M., Muhlenbein, H.: Marginal distributions in evolutionary algorithms. In: Proceed-
ings of the 4th International Conference on Genetic Algorithms (1998)
11. Bubeck, S., Munos, R., Stoltz, G.: Pure Exploration in Multi-armed Bandits Problems. In:
Gavalda, R., Lugosi, G., Zeugmann, T., Zilles, S. (eds.) ALT 2009. LNCS, vol. 5809, pp.
23-37. Springer, Heidelberg (2009)
12. Bubeck, S., Munos, R., Stoltz, G., Szepesvari, C.: X-armed bandits. Journal of Machine
Learning Research 12, 1655-1695 (2011)
13. Garivier, A., Cappe, O.: The KL-UCB algorithm for bounded stochastic bandits and beyond.
CoRR abs/1102.2490 (2011)
14. Rubenstein, R., Kroese, D.: The cross-entropy method: a unified approach to combinatorial
optimization, Monte-Carlo simluation, and machine learning. Springer, New York (2004)
15. Castronovo, M., Maes, F., Fonteneau, R., Ernst, D.: Learning exploration/exploitation strate-
gies for single trajectory reinforcement learning. In: Proc. of 10th European Workshop on
Reinforcement Learning (2012)
 
Search WWH ::




Custom Search