Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Armed Bandit Model Selection for Cold-Start User Recommendation., , , and . UMAP, page 32-40. ACM, (2017)Preference-Like Score to Cope with Cold-Start User in Recommender Systems., , , and . ICTAI, page 62-69. IEEE Computer Society, (2016)A generic architecture for adaptive agents based on reinforcement learning., , and . Inf. Sci., 161 (1-2): 37-55 (2004)"I'm sorry Dave, I'm afraid I can't do that" Deep Q-learning from forbidden action., , and . CoRR, (2019)Consistent Algorithms for Clustering Time Series., , , and . J. Mach. Learn. Res., (2016)Improving offline evaluation of contextual bandit algorithms via bootstrapping techniques., , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 172-180. JMLR.org, (2014)Reinforcement learning for crop management support: Review, prospects and challenges., , , , and . Comput. Electron. Agric., (2022)General System Architecture and COTS Prototyping of an AIoT-Enabled Sailboat for Autonomous Aquatic Ecosystem Monitoring., , , , , , , , and . IEEE Internet Things J., 11 (3): 3801-3811 (February 2024)Soft Action Priors: Towards Robust Policy Transfer., and . CoRR, (2022)gym-DSSAT: a crop model turned into a Reinforcement Learning environment., , , , , and . CoRR, (2022)