Author of the publication

Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks.

, , , , , and . MSWiM, page 99-107. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reinforcement Learning Algorithm Selection., and . ICLR (Poster), OpenReview.net, (2018)Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks., , , , , and . MSWiM, page 99-107. ACM, (2018)LISTEN: A System for Locating and Tracking Individual Speakers., , , , , , and . FG, page 283-288. IEEE Computer Society, (1996)Une méthode d'interprétation de scores., and . EGC, volume RNTI-E-9 of Revue des Nouvelles Technologies de l'Information, page 191-192. Cépaduès-Éditions, (2007)Generic Exploration and K-armed Voting Bandits., , , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 91-99. JMLR.org, (2013)Massive multi-player multi-armed bandits for IoT networks: An application on LoRa networks., , , , and . Ad Hoc Networks, (December 2023)Contact personalization using a score understanding method., , and . IJCNN, page 649-654. IEEE, (2008)Driven Forward Features Selection: A Comparative Study on Neural Networks., and . ICONIP (2), volume 4233 of Lecture Notes in Computer Science, page 693-702. Springer, (2006)Batched Bandits with Crowd Externalities., , , and . CoRR, (2021)Toward Skills Dialog Orchestration with Online Learning., , , , , and . ICASSP, page 3600-3604. IEEE, (2021)