SARSA based access control with approximation by TileCoding
暂无分享,去创建一个
Yuchen Fu | Shan Zhong | Fei Zhu | Quan Liu | Pai Peng | Quan Liu | Fei Zhu | Yuchen Fu | Shan Zhong | Pai Peng
[1] Joshua B. Tenenbaum,et al. Hierarchical Deep Reinforcement Learning: Integrating Temporal Abstraction and Intrinsic Motivation , 2016, NIPS.
[2] Matthias Althoff,et al. Combining zonotopes and support functions for efficient reachability analysis of linear systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[3] Shimon Whiteson,et al. Learning to Communicate with Deep Multi-Agent Reinforcement Learning , 2016, NIPS.
[4] Andreas Jacobsson,et al. A risk analysis of a smart home automation system , 2016, Future Gener. Comput. Syst..
[5] Imran Khan,et al. Wireless sensor network virtualization: A survey , 2015, IEEE Communications Surveys & Tutorials.
[6] Shan Wang,et al. A Survey of Extended Role-Based Access Control in Cloud Computing , 2015 .
[7] David Grace,et al. Application of reinforcement learning on medium access control for wireless sensor networks , 2013 .
[8] Sriram Subramaniam,et al. A Bayesian network model of the bit error rate for cognitive radio networks , 2015, 2015 IEEE 16th Annual Wireless and Microwave Technology Conference (WAMICON).
[9] E. Lutz,et al. Information Gain and Loss for a Quantum Maxwell's Demon. , 2018, Physical review letters.
[10] Parham Moradi,et al. Reinforcement Learning for Multiple Access Control in Wireless Sensor Networks: Review, Model, and Open Issues , 2013, Wireless Personal Communications.
[11] Tong Boon Tang,et al. Vehicle Detection Techniques for Collision Avoidance Systems: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.
[12] H. Pham,et al. Bellman equation and viscosity solutions for mean-field stochastic control problem , 2015, 1512.07866.
[13] Joan Serrat,et al. Management and orchestration challenges in network functions virtualization , 2016, IEEE Communications Magazine.
[14] Ngai-Man Cheung,et al. Embedding Based on Function Approximation for Large Scale Image Search , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Nhien-An Le-Khac,et al. Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.
[16] Stefano Paraboschi,et al. SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases , 2015, ACSAC 2015.
[17] Shay Gueron,et al. Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.
[18] Tom Schaul,et al. Universal Value Function Approximators , 2015, ICML.
[19] M. Serrão,et al. Computer vision and GIS for the navigation of blind persons in buildings , 2013, Universal Access in the Information Society.
[20] David Silver,et al. Deep Reinforcement Learning with Double Q-Learning , 2015, AAAI.
[21] Chao Wang,et al. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks , 2016, Sensors.
[22] J. D. Ultra,et al. A simple model of separation of duty for access control models , 2017, Comput. Secur..
[23] Wei Wei. Classical optimal planning method based on compacted encodings , 2010 .
[24] Daniel M. Hartung,et al. Effects of a prior authorization policy for extended‐release/long‐acting opioids on utilization and outcomes in a state Medicaid program , 2018, Addiction.
[25] Renquan Lu,et al. A New Design of Model Predictive Tracking Control for Networked Control System Under Random Packet Loss and Uncertainties , 2016, IEEE Transactions on Industrial Electronics.
[26] Peter Stone,et al. Deep Recurrent Q-Learning for Partially Observable MDPs , 2015, AAAI Fall Symposia.
[27] Ram Krishnan,et al. Attributes Enhanced Role-Based Access Control Model , 2015, TrustBus.
[28] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[29] Ramaswamy Chandramouli,et al. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) , 2016, ABAC '16.
[30] Ping Wang,et al. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.
[31] Abeba Mitiku Asfaw,et al. The Impact of Training and Development on Employee Performance and Effectiveness: A Case Study of District Five Administration Office, Bole Sub-City, Addis Ababa, Ethiopia , 2015 .
[32] Alex Zhavoronkov,et al. Applications of Deep Learning in Biomedicine. , 2016, Molecular pharmaceutics.
[33] David Silver,et al. A Unified Game-Theoretic Approach to Multiagent Reinforcement Learning , 2017, NIPS.
[34] Haiying Shen,et al. Distributed Autonomous Virtual Resource Management in Datacenters Using Finite-Markov Decision Process , 2014, IEEE/ACM Transactions on Networking.
[35] Ravi S. Sandhu,et al. Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy , 2016, ABAC '16.
[36] J. A. Villar,et al. Status of the ANAIS Dark Matter Project at the Canfranc Underground Laboratory , 2015, 1508.07213.