Author of the publication

Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks.

, , , , , and . MSWiM, page 99-107. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Une méthode d'interprétation de scores., and . EGC, volume RNTI-E-9 of Revue des Nouvelles Technologies de l'Information, page 191-192. Cépaduès-Éditions, (2007)LISTEN: A System for Locating and Tracking Individual Speakers., , , , , , and . FG, page 283-288. IEEE Computer Society, (1996)Massive multi-player multi-armed bandits for IoT networks: An application on LoRa networks., , , , and . Ad Hoc Networks, (December 2023)Generic Exploration and K-armed Voting Bandits., , , and . ICML (2), volume 28 of JMLR Workshop and Conference Proceedings, page 91-99. JMLR.org, (2013)Reinforcement Learning Algorithm Selection., and . ICLR (Poster), OpenReview.net, (2018)Reinforcement Learning Techniques for Optimized Channel Hopping in IEEE 802.15.4-TSCH Networks., , , , , and . MSWiM, page 99-107. ACM, (2018)Driven Forward Features Selection: A Comparative Study on Neural Networks., and . ICONIP (2), volume 4233 of Lecture Notes in Computer Science, page 693-702. Springer, (2006)Toward Skills Dialog Orchestration with Online Learning., , , , , and . ICASSP, page 3600-3604. IEEE, (2021)Horizontal Scaling in Cloud Using Contextual Bandits., , , , and . Euro-Par, volume 12820 of Lecture Notes in Computer Science, page 285-300. Springer, (2021)Batched Bandits with Crowd Externalities., , , and . CoRR, (2021)