Author of the publication

Approximate policy iteration using regularised Bellman residuals minimisation.

, and . J. Exp. Theor. Artif. Intell., 28 (1-2): 351-367 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Policy Iteration with Bellman Residuals Minimization., and . CCIA, volume 269 of Frontiers in Artificial Intelligence and Applications, page 3-12. IOS Press, (2014)A Data Mining Methodology for Event Analysis in Neurophysiological Signals., , , , , , and . CCIA, volume 277 of Frontiers in Artificial Intelligence and Applications, page 80-89. IOS Press, (2015)Regularized approximate policy iteration using kernel for on-line reinforcement learning.. Polytechnic University of Catalonia, Spain, (2015)Approximate policy iteration using regularised Bellman residuals minimisation., and . J. Exp. Theor. Artif. Intell., 28 (1-2): 351-367 (2016)Using Kernel Alignment for Feature Selection in Schizophrenia Diagnostic., , , , , , , , and . CCIA, volume 277 of Frontiers in Artificial Intelligence and Applications, page 143-152. IOS Press, (2015)Bluues: a program for the analysis of the electrostatic properties of proteins based on generalized Born radii., , , , , and . BMC Bioinform., 13 (S-4): S18 (2012)A randomized algorithm for exact transduction., and . CCIA, volume 269 of Frontiers in Artificial Intelligence and Applications, page 13-22. IOS Press, (2014)Kernel alignment for identifying objective criteria from brain MEG recordings in schizophrenia., , , , , , , , and . Pattern Recognit. Lett., (2017)Ontology-based Data Integration with MASTRO-I for Configuration and Data Management at SELEX Sistemi Integrati., , , , and . SEBD, page 81-92. (2008)Work in Progress: Implicit Association Tests for Understanding Human Factor in Phishing Beyond Awareness., , , , , and . EuroS&P Workshops, page 519-526. IEEE, (2024)