Academic literature on the topic 'Bandes armées'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bandes armées.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bandes armées"

1

Le Jan, Régine. "Satellites et bandes armées dans le monde franc (VIIe-Xe siècles)." Actes de la Société des historiens médiévistes de l'enseignement supérieur public 18, no. 1 (1987): 97–105. http://dx.doi.org/10.3406/shmes.1987.1485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Méouchy, Nadine. "Mizrahi Jean-David, Genèse de l’État mandataire. Service des renseignements et bandes armées en Syrie et au Liban dans les années 1920, Paris, Publications de la Sorbonne, 2003, 462 p. , 12 cartes, 15 tableaux et 11 photographies." Revue des mondes musulmans et de la Méditerranée, no. 103-104 (June 15, 2004): 321–27. http://dx.doi.org/10.4000/remmm.2416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ray, Daniel E. "Military Bands and Government Documents." DttP: Documents to the People 44, no. 4 (2017): 27. http://dx.doi.org/10.5860/dttp.v44i4.6227.

Full text
Abstract:
Since before the founding of the United States, musicians have been an integral part of the military. Throughout history armies have used trumpets and drums to enhance communication and assist the movement of mass forces. Over time, the military has influenced both the makeup of musical ensembles, and styles of popular music. The modern American wind band featuring brass, woodwinds and percussion, is modeled after British military bands. And the marches of John Phillip Sousa, who served as the director of the President’s Own Marine Band for twelve years, remain popular to this day. His “Stars
APA, Harvard, Vancouver, ISO, and other styles
4

Amirizadeh, Khosrow, and Rajeswari Mandava. "Accelerated -Greedy Multi Armed Bandit Algorithm for Online Sequential-Selections Applications." Journal of Software 10, no. 3 (2015): 239–49. http://dx.doi.org/10.17706/jsw.10.3.239-249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mears, John A. "The Thirty Years' War, the “General Crisis,” and the Origins of a Standing Professional Army in the Habsburg Monarchy." Central European History 21, no. 2 (1988): 122–41. http://dx.doi.org/10.1017/s0008938900012711.

Full text
Abstract:
One of the most striking features of seventeenth-century state building was the formation of standing armies. Kings and princes throughout Europe, responding to conditions of almost constant strife, were compelled to transform ineffective feudal levies and unruly bands of mercenaries into regularized bodies of professional troops, making ever larger and more costly military establishments instruments of rational foreign policy rather than the preserves of the old nobility or freebootingcondottieri. In building armies of the new type, European monarchs had to surmount determined opposition from
APA, Harvard, Vancouver, ISO, and other styles
6

Ding, Na, Jiao Bo Gao, and Jun Wang. "Camouflage Target Identification Based on Hyperspectral Imaging System." Applied Mechanics and Materials 135-136 (October 2011): 341–46. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.341.

Full text
Abstract:
A novel system of implementing target identification with hyperspectral imaging system based on acousto-optic tunable filter (AOTF) was proposed. The system consists of lens, AOTF, AOTF driver, CCD and image collection installation. Owing to the high spatial and spectral resolution, the system can operate in the spectral range from visible light to near infrared band. An experiment of detecting and recognizing of two different kinds of camouflage armets from background was presented. When the characteristic spectral wave bands are 680nm and 750nm, the two camouflage armets exhibit different sp
APA, Harvard, Vancouver, ISO, and other styles
7

VARTAVARIAN, MESROB. "Pacification and Patronage in the Maratha Deccan, 1803–1818." Modern Asian Studies 50, no. 6 (2016): 1749–91. http://dx.doi.org/10.1017/s0026749x16000044.

Full text
Abstract:
AbstractThis article examines pacification operations conducted by British colonial armies throughout the Maratha Deccan from 1803 to 1818. The East India Company assembled concentrations of coercive force by extending patronage to loyalist elites and mobile war bands. Military contingents from allied princely states were mobilized and combined with a policy of brokerage intended to demobilize hostile forces holed up in forts or engaged in brigandage. Pacification through a mixture of negotiations and force ensured loyalist groups a privileged place in the emerging colonial order.
APA, Harvard, Vancouver, ISO, and other styles
8

Rivet, Daniel, and Jean-David Mizrahi. "Genese de l'Etat mandataire. Service des Renseignements et bandes armees en Syrie et au Liban dans les annees 1920." Vingtième Siècle. Revue d'histoire, no. 82 (April 2004): 198. http://dx.doi.org/10.2307/3771625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mizrahi, Jean-David. "Un "nationalisme de la frontiere". Bandes armees et sociabilites politiques sur la frontiere turco-syrienne au debut des annees 1920." Vingtième Siècle. Revue d'histoire, no. 78 (April 2003): 19. http://dx.doi.org/10.2307/3772569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanner, Samuel. "De la sécurité privée à l’armée de destruction massive. La « bande armée » et la criminalité de masse." Criminologie 45, no. 1 (2012): 29–49. http://dx.doi.org/10.7202/1008375ar.

Full text
Abstract:
Dans cet article, nous nous intéressons à la mobilisation et la participation d’une bande armée – les Scorpions – dans les événements qui se sont produits en ex-Yougoslavie, durant les années 1990. Si l’étude de cette figure centrale des crimes de masse est nécessaire à la compréhension de ce phénomène et, ultimement, à sa prévention, elle se justifie aussi d’un point de vue épistémologique : plutôt que d’ancrer une réflexion sur l’individu et ses motivations, démarche courante pour une criminologie dominante centrée sur les préoccupations sécuritaires des sociétés occidentales, nous postulons
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Bandes armées"

1

Gajane, Pratik. "Multi-armed bandits with unconventional feedback." Thesis, Lille 3, 2017. http://www.theses.fr/2017LIL30045/document.

Full text
Abstract:
Dans cette thèse, nous étudions des problèmes de prise de décisions séquentielles dans lesquels, pour chacune de ses décisions, l'apprenant reçoit une information qu'il utilise pour guider ses décisions futures. Pour aller au-delà du retour d’information conventionnel tel qu'il a été bien étudié pour des problèmes de prise de décision séquentielle tels que les bandits multi-bras, nous considérons des formes de retour d’information partielle motivées par des applications pratiques.En premier, nous considérons le problème des bandits duellistes, dans lequel l'apprenant sélectionne deux actions à
APA, Harvard, Vancouver, ISO, and other styles
2

Galichet, Nicolas. "Contributions to Multi-Armed Bandits : Risk-Awareness and Sub-Sampling for Linear Contextual Bandits." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112242/document.

Full text
Abstract:
Cette thèse s'inscrit dans le domaine de la prise de décision séquentielle en environnement inconnu, et plus particulièrement dans le cadre des bandits manchots (multi-armed bandits, MAB), défini par Robbins et Lai dans les années 50. Depuis les années 2000, ce cadre a fait l'objet de nombreuses recherches théoriques et algorithmiques centrées sur le compromis entre l'exploration et l'exploitation : L'exploitation consiste à répéter le plus souvent possible les choix qui se sont avérés les meilleurs jusqu'à présent. L'exploration consiste à essayer des choix qui ont rarement été essayés, pour
APA, Harvard, Vancouver, ISO, and other styles
3

Hadiji, Hédi. "On some adaptivity questions in stochastic multi-armed bandits." Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPASM021.

Full text
Abstract:
Cette thèse s'inscrit dans le domaine des statistiques séquentielles. Le cadre principal étudié est celui des bandits stochastiques à plusieurs bras, cadre idéal qui modélise le dilemme exploration-exploitation face à des choix répétés. La thèse est composée de quatre chapitres, précédés d'une introduction. Dans la première partie du corps de la thèse, on présente un nouvel algorithme capable d'atteindre des garanties optimales à la fois d'un point de vue distribution-dépendent et distribution-free. Les deux chapitres suivants sont consacrés à des questions dites d'adaptation. D'abord, on prop
APA, Harvard, Vancouver, ISO, and other styles
4

Magureanu, Stefan. "Structured Stochastic Bandits." Licentiate thesis, KTH, Reglerteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-182816.

Full text
Abstract:
In this thesis we address the multi-armed bandit (MAB) problem with stochastic rewards and correlated arms. Particularly, we investigate the case when the expected rewards are a Lipschitz function of the arm, and the learning to rank problem, as viewed from a MAB perspective. For the former, we derive a problem specific lower bound and propose both an asymptotically optimal algorithm (OSLB) and a (pareto)optimal, algorithm (POSLB). For the latter, we construct the regret lower bound and determine its closed form for some particular settings, as well as propose two asymptotically optimal algori
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Kehao. "Multi-channel opportunistic access : a restless multi-armed bandit perspective." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00832569.

Full text
Abstract:
In the thesis, we address the fundamental problem of opportunistic spectrum access in a multi-channel communication system. Specifically, we consider a communication system in which a user has access to multiple channels, but is limited to sensing and transmitting only on one at a given time. We explore how the smart user should exploit past observations and the knowledge of the stochastic properties of these channels to maximize its transmission rate by switching channels opportunistically. Formally, we provide a generic analysis on the opportunistic spectrum access problem by casting the pro
APA, Harvard, Vancouver, ISO, and other styles
6

Wan, Hao. "Tutoring Students with Adaptive Strategies." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-dissertations/36.

Full text
Abstract:
Adaptive learning is a crucial part in intelligent tutoring systems. It provides students with appropriate tutoring interventions, based on students’ characteristics, status, and other related features, in order to optimize their learning outcomes. It is required to determine students’ knowledge level or learning progress, based on which it then uses proper techniques to choose the optimal interventions. In this dissertation work, I focus on these aspects related to the process in adaptive learning: student modeling, k-armed bandits, and contextual bandits. Student modeling. The main o
APA, Harvard, Vancouver, ISO, and other styles
7

Racey, Deborah Elaine. "EFFECTS OF RESPONSE FREQUENCY CONSTRAINTS ON LEARNING IN A NON-STATIONARY MULTI-ARMED BANDIT TASK." OpenSIUC, 2009. https://opensiuc.lib.siu.edu/dissertations/86.

Full text
Abstract:
An n-armed bandit task was used to investigate the trade-off between exploratory (choosing lesser-known options) and exploitive (choosing options with the greatest probability of reinforcement) human choice in a trial-and-error learning problem. In Experiment 1 a different probability of reinforcement was assigned to each of 8 response options using random-ratios (RRs), and participants chose by clicking buttons in a circular display on a computer screen using a computer mouse. Relative frequency thresholds (ranging from .10 to 1.0) were randomly assigned to each participant and acted as task
APA, Harvard, Vancouver, ISO, and other styles
8

Audibert, Jean-Yves. "PAC-Bayesian aggregation and multi-armed bandits." Habilitation à diriger des recherches, Université Paris-Est, 2010. http://tel.archives-ouvertes.fr/tel-00843972.

Full text
Abstract:
This habilitation thesis presents several contributions to (1) the PAC-Bayesian analysis of statistical learning, (2) the three aggregation problems: given d functions, how to predict as well as (i) the best of these d functions (model selection type aggregation), (ii) the best convex combination of these d functions, (iii) the best linear combination of these d functions, (3) the multi-armed bandit problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Morse, Matthew C. 1967. "The West Point Band's Wind Commissioning Project in Celebration of the Bicentennial of the United States Military Academy." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc984246/.

Full text
Abstract:
The United States Military Academy Band, also known as the West Point Band is the oldest active band in the United States Army and the oldest unit at the United States Military Academy, and is considered to be one of the finest military musical organizations in the world. The band has also been instrumental in facilitating the creation of new works for wind band.As the commissioning of new music has been essential to the expansion of the wind band's repertoire, several major commissioning projects were undertaken in the mid-twentieth century by various organizations, including the West Point B
APA, Harvard, Vancouver, ISO, and other styles
10

Ruíz, Hernández Diego. "Essays on indexability of stochastic sheduling and dynamic allocation problems." Doctoral thesis, Universitat Pompeu Fabra, 2007. http://hdl.handle.net/10803/7347.

Full text
Abstract:
In this Thesis, we first deploy Gittins index theory to establish the indexability of inter-alia general families of restless bandits that arise in problems of stochastic scheduling with switching penalties and machine maintenance. We also give formulae for the resulting indices. Numerical investigations testify the strong performance of the index heuristics.<br/><br/>The second class of problems concerns two families of Markov decision problems. The spinning plates problem concerns the optimal management of a portfolio of assets whose yields grow with investment but otherwise decline. In
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Bandes armées"

1

Genèse de l'État mandataire: Service des renseignements et bandes armées en Syrie et au Liban dans les années 1920. Publications de la Sorbonne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bands of sisters: U.S. women's military bands during World War II. Scarecrow Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ivanov, Ivan S. Znamenata na boĭnata slava. Izdatelstvo "Aniko", 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scardigli, Marco. Il braccio indigeno: Ascari, irregolari e bande nella conquista dell'Eritrea : 1885- 1911. F. Angeli, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Erendil, Muzaffer. Dünden bu güne mehter. Genelkurmay Basım Evi, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Erendil, Muzaffer. Dünden bu güne mehter. Genelkurmay Basım Evi, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

De la musique et des militaires. Ministère de la défense, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roberto, Garretón Merino, and Garretón Merino Carmen, eds. Por la fuerza sin la razón: Análisis y textos de los bandos de la dictadura militar. LOM Ediciones, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pavlowitch, Stevan, and Dejan Djokic. Hitler's New Disorder. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197537039.001.0001.

Full text
Abstract:
The history of the Second World War in Yugoslavia was for a long time the preserve of the Communist regime led by Marshal Tito. It was written by those who had battled hard to come out on top of the many-sided war fought across the territory of that Balkan state after the Axis Powers had destroyed it in 1941, just before Hitler's invasion of the USSR. It was an ideological and ethnic war under occupation by rival enemy powers and armies, between many insurgents, armed bands and militias, for the survival of one group, for the elimination of another, for belief in this or that ideology, for a r
APA, Harvard, Vancouver, ISO, and other styles
10

Attridge, Steve. Character, Sacrifice, and Scapegoats. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198806516.003.0006.

Full text
Abstract:
While Lord Kitchener was lauded at home for his self-sacrificial qualities, in the field he implemented scorched-earth policies and pioneered the use of concentration camps. Writers including Rudyard Kipling exposed the cruel practices on which the British Army depended in the course of the Boer Wars (1899–1902), critiquing the military leadership. A space then opened in fictional narrative for the representation of a new type of protagonist—the rebel, the self-reliant adventurer or irregular who could make personal sacrifices through individual ethical choice rather than as a consequence of m
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Bandes armées"

1

Gautier, Alban. "Les activités compétitives au sein des bandes armées de l’Europe du Nord au haut Moyen Âge." In Agôn. La compétition, Ve-XIIe siècle. Brepols Publishers, 2012. http://dx.doi.org/10.1484/m.hama-eb.1.101217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mannor, Shie. "k-Armed Bandit." In Encyclopedia of Machine Learning and Data Mining. Springer US, 2017. http://dx.doi.org/10.1007/978-1-4899-7687-1_424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mannor, Shie, Xin Jin, Jiawei Han, et al. "k-Armed Bandit." In Encyclopedia of Machine Learning. Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-30164-8_424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fürnkranz, Johannes, Philip K. Chan, Susan Craw, et al. "Multi-Armed Bandit." In Encyclopedia of Machine Learning. Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-30164-8_565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Neha, Ole-Christoffer Granmo, and Ashok Agrawala. "Successive Reduction of Arms in Multi-Armed Bandits." In Research and Development in Intelligent Systems XXVIII. Springer London, 2011. http://dx.doi.org/10.1007/978-1-4471-2318-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Xiaoqiang, Xianyi Wu, and Xian Zhou. "Multi-Armed Bandit Processes." In International Series in Operations Research & Management Science. Springer US, 2014. http://dx.doi.org/10.1007/978-1-4899-7405-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mahajan, Aditya, and Demosthenis Teneketzis. "Multi-Armed Bandit Problems." In Foundations and Applications of Sensor Management. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-49819-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cesa-Bianchi, Nicolò. "Multi-armed Bandit Problem." In Encyclopedia of Algorithms. Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fürnkranz, Johannes, Philip K. Chan, Susan Craw, et al. "Multi-Armed Bandit Problem." In Encyclopedia of Machine Learning. Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-30164-8_566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cesa-Bianchi, Nicolò. "Multi-armed Bandit Problem." In Encyclopedia of Algorithms. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27848-8_768-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Bandes armées"

1

Carlsson, Emil, Devdatt Dubhashi, and Fredrik D. Johansson. "Thompson Sampling for Bandits with Clustered Arms." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/305.

Full text
Abstract:
We propose algorithms based on a multi-level Thompson sampling scheme, for the stochastic multi-armed bandit and its contextual variant with linear expected rewards, in the setting where arms are clustered. We show, both theoretically and empirically, how exploiting a given cluster structure can significantly improve the regret and computational cost compared to using standard Thompson sampling. In the case of the stochastic multi-armed bandit we give upper bounds on the expected cumulative regret showing how it depends on the quality of the clustering. Finally, we perform an empirical evaluat
APA, Harvard, Vancouver, ISO, and other styles
2

Pandey, Sandeep, Deepayan Chakrabarti, and Deepak Agarwal. "Multi-armed bandit problems with dependent arms." In the 24th international conference. ACM Press, 2007. http://dx.doi.org/10.1145/1273496.1273587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bouneffouf, Djallel, Irina Rish, Guillermo Cecchi, and Raphaël Féraud. "Context Attentive Bandits: Contextual Bandit with Restricted Context." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/203.

Full text
Abstract:
We consider a novel formulation of the multi-armed bandit model, which we call the contextual bandit with restricted context, where only a limited number of features can be accessed by the learner at every iteration. This novel formulation is motivated by different online problems arising in clinical trials, recommender systems and attention modeling.Herein, we adapt the standard multi-armed bandit algorithm known as Thompson Sampling to take advantage of our restricted context setting, and propose two novel algorithms, called the Thompson Sampling with Restricted Context (TSRC) and the Window
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Jeff Jun, and Siddharth Garg. "BandiTS: Dynamic timing speculation using multi-armed bandit based optimization." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sriyananda, M. G. S., Imtiaz Parvez, Ismail Guvene, Mehdi Bennis, and Arif I. Sarwat. "Multi-armed bandit for LTE-U and WiFi coexistence in unlicensed bands." In 2016 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2016. http://dx.doi.org/10.1109/wcnc.2016.7564899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yahyaa, Saba Q., and Madalina M. Drugan. "Correlated Gaussian Multi-Objective Multi-Armed Bandit Across Arms Algorithm." In 2015 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 2015. http://dx.doi.org/10.1109/ssci.2015.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lopez-Martinez, Mario, Juan J. Alcaraz, Leonardo Badia, and Michele Zorzi. "Multi-armed bandits with dependent arms for Cooperative Spectrum Sharing." In 2015 IEEE International Conference on Signal Processing for Communications (ICC). IEEE, 2015. http://dx.doi.org/10.1109/icc.2015.7249554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gao, Guoju, He Huang, Mingjun Xiao, Jie Wu, Yu-E. Sun, and Sheng Zhang. "Auction-Based Combinatorial Multi-Armed Bandit Mechanisms with Strategic Arms." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 2021. http://dx.doi.org/10.1109/infocom42981.2021.9488765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Yi, Miao Xie, Jiahao Liu, et al. "A Practical Semi-Parametric Contextual Bandit." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/450.

Full text
Abstract:
Classic multi-armed bandit algorithms are inefficient for a large number of arms. On the other hand, contextual bandit algorithms are more efficient, but they suffer from a large regret due to the bias of reward estimation with finite dimensional features. Although recent studies proposed semi-parametric bandits to overcome these defects, they assume arms' features are constant over time. However, this assumption rarely holds in practice, since real-world problems often involve underlying processes that are dynamically evolving over time especially for the special promotions like Singles' Day
APA, Harvard, Vancouver, ISO, and other styles
10

Nayyar, Naumaan, Yi Gai, and Bhaskar Krishnamachari. "On a restless multi-armed bandit problem with non-identical arms." In 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2011. http://dx.doi.org/10.1109/allerton.2011.6120191.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Bandes armées"

1

Yun, Seyoung, Jun Hyun Nam, Sangwoo Mo, and Jinwoo Shin. Contextual Multi-armed Bandits under Feature Uncertainty. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1345927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Glazebrook, Kevin D., Donald P. Gaver, and Patricia A. Jacobs. Military Stochastic Scheduling Treated As a 'Multi-Armed Bandit' Problem. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada385864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fryer, Roland, and Philipp Harms. Two-Armed Restless Bandits with Imperfect Information: Stochastic Control and Indexability. National Bureau of Economic Research, 2013. http://dx.doi.org/10.3386/w19043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Haoyang, Keqin Liu, and Qing Zhao. Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada554798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Commonwealth Bank - Head Office cnr Pitt Street & Martin Place - Construction - Bank's Coat-of-Arms - 9 August 1915 (plate 322). Reserve Bank of Australia, 2021. http://dx.doi.org/10.47688/rba_archives_pn-000708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Head Office - Construction of new premises (Bank's Coat of Arms attached to Pitt Street frontage) - 31 July 1915 (plate 585). Reserve Bank of Australia, 2021. http://dx.doi.org/10.47688/rba_archives_pn-000704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Commonwealth Bank - Head Office - Cnr Pitt Street & Martin Place - Construction - Bank's Coat of Arms attached to Pitt St frontage - 31 July 1915 (plate 673). Reserve Bank of Australia, 2021. http://dx.doi.org/10.47688/rba_archives_pn-000703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Commonwealth Bank - Head Office cnr Pitt Street & Martin Place - Construction of the Bank's Coat of Arms attached to the Pitt Street frontage - 31 July 1915 (plate 584). Reserve Bank of Australia, 2021. http://dx.doi.org/10.47688/rba_archives_pn-000705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!