Journal articles on the topic 'Epsilon greedy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Epsilon greedy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Yang, Qiuyu Lu, Zhenfan Yu, Yue Chen, and Yinguo Yang. "Reinforcement Learning-Enhanced Adaptive Scheduling of Battery Energy Storage Systems in Energy Markets." Energies 17, no. 21 (2024): 5425. http://dx.doi.org/10.3390/en17215425.
Full textKyoung, Dohyun, and Yunsick Sung. "Transformer Decoder-Based Enhanced Exploration Method to Alleviate Initial Exploration Problems in Reinforcement Learning." Sensors 23, no. 17 (2023): 7411. http://dx.doi.org/10.3390/s23177411.
Full textKURNIAWATI, NAZMIA, YULI KURNIA NINGSIH, SOFIA DEBI PUSPA, and TRI SWASONO ADI. "Algoritma Epsilon Greedy pada Reinforcement Learning untuk Modulasi Adaptif Komunikasi Vehicle to Infrastructure (V2I)." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 9, no. 3 (2021): 716. http://dx.doi.org/10.26760/elkomika.v9i3.716.
Full textLiu, Zizhuo. "Investigation of progress and application related to Multi-Armed Bandit algorithms." Applied and Computational Engineering 37, no. 1 (2024): 155–59. http://dx.doi.org/10.54254/2755-2721/37/20230496.
Full textYashiki, Koudai, Masayuki Wajima, Takashi Kawakami, Takahumi Oohori, and Masahiro Kinoshita. "2A1-J10 The group behavior using a epsilon-greedy." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2007 (2007): _2A1—J10_1—_2A1—J10_2. http://dx.doi.org/10.1299/jsmermd.2007._2a1-j10_1.
Full textLiu, Qiaojia. "Optimizing Short and Long Term Investment Returns Using Multi-Armed Slot Machine Algorithms." Applied and Computational Engineering 83, no. 1 (2024): 110–19. http://dx.doi.org/10.54254/2755-2721/83/2024glg0068.
Full textDell'Aversana, Paolo. "Reinforcement learning in optimization problems. Applications to geophysical data inversion." AIMS Geosciences 8, no. 3 (2022): 488–502. http://dx.doi.org/10.3934/geosci.2022027.
Full textYou, Xinhong, Pengping Zhang, Minglin Liu, Lingqi Lin, and Shuai Li. "Epsilon-Greedy-Based MQTT QoS Mode Selection and Power Control Algorithm for Power Distribution IoT." International Journal of Mobile Computing and Multimedia Communications 14, no. 1 (2023): 1–18. http://dx.doi.org/10.4018/ijmcmc.306976.
Full textZhang, Lingxiang. "Analyzing the strengths and weaknesses of diverse algorithms for solving Multi-Armed Bandit problems using Python." Applied and Computational Engineering 68, no. 1 (2024): 205–14. http://dx.doi.org/10.54254/2755-2721/68/20241407.
Full textMalon, Krzysztof. "Evaluation of Radio Channel Utility using Epsilon-Greedy Action Selection." Journal of Telecommunictions and Information Technology 3, no. 2021 (2021): 10–17. http://dx.doi.org/10.26636/jtit.2021.153621.
Full textTran, T. D., and A. E. Koucheryavy. "Resource Optimization of Airborne Base Stations Using Artificial Intelligence Methods." Proceedings of Telecommunication Universities 11, no. 1 (2025): 62–68. https://doi.org/10.31854/1813-324x-2025-11-1-62-68.
Full textTian, Chuan. "Monte-Carlo tree search with Epsilon-Greedy for game of amazons." Applied and Computational Engineering 6, no. 1 (2023): 904–9. http://dx.doi.org/10.54254/2755-2721/6/20230956.
Full textYu, Junpu. "Thompson -Greedy Algorithm: An Improvement to the Regret of Thompson Sampling and -Greedy on Multi-Armed Bandit Problems." Applied and Computational Engineering 8, no. 1 (2023): 525–34. http://dx.doi.org/10.54254/2755-2721/8/20230264.
Full textFei, Bo. "Comparative analysis and applications of classic multi-armed bandit algorithms and their variants." Applied and Computational Engineering 68, no. 1 (2024): 17–30. http://dx.doi.org/10.54254/2755-2721/68/20241389.
Full textN, Hariharan, and Paavai Anand G. "A Brief Study of Deep Reinforcement Learning with Epsilon-Greedy Exploration." International Journal of Computing and Digital Systems 11, no. 1 (2022): 541–51. http://dx.doi.org/10.12785/ijcds/110144.
Full textGu, Jiahao. "Assessing the robustness of Multi-Armed Bandit algorithms against biased initialization." Applied and Computational Engineering 54, no. 1 (2024): 213–18. http://dx.doi.org/10.54254/2755-2721/54/20241586.
Full textSenthil Kumar, S., Nada Alzaben, A. Sridevi, and V. Ranjith. "Improving Quality of Service (QoS) in Wireless Multimedia Sensor Networks using Epsilon Greedy Strategy." Measurement Science Review 24, no. 3 (2024): 113–17. http://dx.doi.org/10.2478/msr-2024-0016.
Full textFirman, Daru April, Hartomo Kristoko Dwi, and Purnomo Hindriyanto Dwi. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782–91. https://doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textDaru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.
Full textPazis, Jason, and Ronald Parr. "PAC Optimal Exploration in Continuous Space Markov Decision Processes." Proceedings of the AAAI Conference on Artificial Intelligence 27, no. 1 (2013): 774–81. http://dx.doi.org/10.1609/aaai.v27i1.8678.
Full textOuyang, Enqi. "Tackling the cold start issue in movie recommendations with a refined epsilon-greedy approach." Applied and Computational Engineering 54, no. 1 (2024): 21–29. http://dx.doi.org/10.54254/2755-2721/54/20241140.
Full textSong, Ruibo. "Optimizing decision-making in uncertain environments through analysis of stochastic stationary Multi-Armed Bandit algorithms." Applied and Computational Engineering 68, no. 1 (2024): 93–113. http://dx.doi.org/10.54254/2755-2721/68/20241406.
Full textZhang, Qinchuan. "Multi-Armed Bandit Algorithms: Analysis and Applications Across Domains." Highlights in Science, Engineering and Technology 94 (April 26, 2024): 170–74. http://dx.doi.org/10.54097/apzhv358.
Full textZhang, Shengshi. "Optimizing Data Filtering in Multi-Armed Bandit Algorithms for Reinforcement Learning." ITM Web of Conferences 73 (2025): 01024. https://doi.org/10.1051/itmconf/20257301024.
Full textQiu, Zirou, Chen Chen, Madhav Marathe, et al. "Finding Nontrivial Minimum Fixed Points in Discrete Dynamical Systems: Complexity, Special Case Algorithms and Heuristics." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (2022): 9422–30. http://dx.doi.org/10.1609/aaai.v36i9.21174.
Full textFeng, Yunhe, and Chirag Shah. "Has CEO Gender Bias Really Been Fixed? Adversarial Attacking and Improving Gender Fairness in Image Search." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 11882–90. http://dx.doi.org/10.1609/aaai.v36i11.21445.
Full textGuo, Yushi. "Strategy Selection Using Multi-Armed Bandit Algorithms in Financial Markets." Applied and Computational Engineering 83, no. 1 (2024): 81–93. http://dx.doi.org/10.54254/2755-2721/83/2024glg0075.
Full textAmeen, Salem, and Sunil Vadera. "Pruning Neural Networks Using Multi-Armed Bandits." Computer Journal 63, no. 7 (2019): 1099–108. http://dx.doi.org/10.1093/comjnl/bxz078.
Full textBui, Van-Hai, Akhtar Hussain, and Hak-Man Kim. "Q-Learning-Based Operation Strategy for Community Battery Energy Storage System (CBESS) in Microgrid System." Energies 12, no. 9 (2019): 1789. http://dx.doi.org/10.3390/en12091789.
Full textLin, Yiheng. "Finding the best opening in chess with multi-armed bandit algorithm." Applied and Computational Engineering 13, no. 1 (2023): 21–28. http://dx.doi.org/10.54254/2755-2721/13/20230704.
Full textDeshpande, Mihir. "Deep Reinforcement Learning for Supply Chain Optimization: A DQN and LSTM-Based Approach." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3794–803. https://doi.org/10.22214/ijraset.2025.69117.
Full textJin, Tianyuan, Hao-Lun Hsu, William Chang, and Pan Xu. "Finite-Time Frequentist Regret Bounds of Multi-Agent Thompson Sampling on Sparse Hypergraphs." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 11 (2024): 12956–64. http://dx.doi.org/10.1609/aaai.v38i11.29193.
Full textMintz, Yonatan, Anil Aswani, Philip Kaminsky, Elena Flowers, and Yoshimi Fukuoka. "Nonstationary Bandits with Habituation and Recovery Dynamics." Operations Research 68, no. 5 (2020): 1493–516. http://dx.doi.org/10.1287/opre.2019.1918.
Full textKarimi, Maryam, Reza Javidan, and Manijeh Keshtgari. "A New Method for Intelligent Message Network Management in Ubiquitous Sensor Networks." Computer Engineering and Applications Journal 3, no. 3 (2014): 139–46. http://dx.doi.org/10.18495/comengapp.v3i3.69.
Full textHuang, Wuyue, Wenling Wang, Yudong Wu, and Chuheng Xi. "Comparative Study of Multi-Armed Bandit Algorithms in Clinical Trials." Applied and Computational Engineering 83, no. 1 (2024): 45–51. http://dx.doi.org/10.54254/2755-2721/83/2024glg0067.
Full textWang, Zhiwei, Huazheng Wang, and Hongning Wang. "Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 14 (2024): 15770–77. http://dx.doi.org/10.1609/aaai.v38i14.29506.
Full textDowlatshahi, Mohammad, Vali Derhami, and Hossein Nezamabadi-pour. "Ensemble of Filter-Based Rankers to Guide an Epsilon-Greedy Swarm Optimizer for High-Dimensional Feature Subset Selection." Information 8, no. 4 (2017): 152. http://dx.doi.org/10.3390/info8040152.
Full textGhulam Mustafa, Hammad. "Self-Operating Stock Exchange – A Deep Reinforcement Learning Approach." UMT Artificial Intelligence Review 1, no. 1 (2021): 1. http://dx.doi.org/10.32350/umtair.11.02.
Full textde Curtò, J., I. de Zarzà, Gemma Roig, Juan Carlos Cano, Pietro Manzoni, and Carlos T. Calafate. "LLM-Informed Multi-Armed Bandit Strategies for Non-Stationary Environments." Electronics 12, no. 13 (2023): 2814. http://dx.doi.org/10.3390/electronics12132814.
Full textVarsha D. Jadhav, Et al. "Understanding the Order of 500 and 1000 Rupees Notes Ban using Reinforcement Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2482–88. http://dx.doi.org/10.17762/ijritcc.v11i10.9047.
Full textCzech, Johannes, Patrick Korus, and Kristian Kersting. "Improving AlphaZero Using Monte-Carlo Graph Search." Proceedings of the International Conference on Automated Planning and Scheduling 31 (May 17, 2021): 103–11. http://dx.doi.org/10.1609/icaps.v31i1.15952.
Full textShen, Tongle. "Adaptive Game Mechanics: Leveraging Multi-Armed Bandits for Dynamic Difficulty Adjustment." Applied and Computational Engineering 105, no. 1 (2024): 117–22. https://doi.org/10.54254/2755-2721/2024.tj17900.
Full textSiddharth Gupta. "Scaling and Optimizing Consumer Tech Products with Multi-Armed Bandit Algorithms: Applications in eCommerce." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 275–86. https://doi.org/10.32628/cseit251112370.
Full textWang, Dongjie, Pengyang Wang, Kunpeng Liu, Yuanchun Zhou, Charles E. Hughes, and Yanjie Fu. "Reinforced Imitative Graph Representation Learning for Mobile User Profiling: An Adversarial Training Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 5 (2021): 4410–17. http://dx.doi.org/10.1609/aaai.v35i5.16567.
Full textMadarasi, Péter. "Matchings under distance constraints I." Annals of Operations Research 305, no. 1-2 (2021): 137–61. http://dx.doi.org/10.1007/s10479-021-04127-8.
Full textValenzano, Richard, Nathan Sturtevant, Jonathan Schaeffer, and Fan Xie. "A Comparison of Knowledge-Based GBFS Enhancements and Knowledge-Free Exploration." Proceedings of the International Conference on Automated Planning and Scheduling 24 (May 11, 2014): 375–79. http://dx.doi.org/10.1609/icaps.v24i1.13681.
Full textKletzander, Lucas, and Nysret Musliu. "Large-State Reinforcement Learning for Hyper-Heuristics." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 10 (2023): 12444–52. http://dx.doi.org/10.1609/aaai.v37i10.26466.
Full textAn, Lei. "Multi-Armed Bandit Algorithms: Innovations and Applications in Dynamic Environments." Highlights in Science, Engineering and Technology 94 (April 26, 2024): 236–40. http://dx.doi.org/10.54097/3n7ctj84.
Full textHan, Huiyan, Jiaqi Wang, Liqun Kuang, Xie Han, and Hongxin Xue. "Improved Robot Path Planning Method Based on Deep Reinforcement Learning." Sensors 23, no. 12 (2023): 5622. http://dx.doi.org/10.3390/s23125622.
Full textEl Wafi, Mouna, My Abdelkader Youssefi, Rachid Dakir, and Mohamed Bakir. "Intelligent Robot in Unknown Environments: Walk Path Using Q-Learning and Deep Q-Learning." Automation 6, no. 1 (2025): 12. https://doi.org/10.3390/automation6010012.
Full text