Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating robustness in a two layer simulated robot architecture., and . J. Exp. Theor. Artif. Intell., 12 (2): 213-234 (2000)Automatic U.S. Vehicle License Plate Extraction and License Number Splitting Under Various Illumination Conditions., and . CCCT (2), page 143-148. The International Institute of Informatics and Systemics (IIIS), (2004)An Adaptive Neural Network Filter for Improved Patient State Estimation in Closed-Loop Anesthesia Control., , , and . ICTAI, page 41-46. IEEE Computer Society, (2011)Cellular Encoding Applied to Neurocontrol., , and . ICGA, page 460-469. Morgan Kaufmann, (1995)Q-Learning: From Computer Network Security to Software Security., and . ICMLA, page 257-262. IEEE, (2014)A theoretical Q-learning temporary security repair., and . CICS, page 74-80. IEEE, (2014)Integrating POMDP and Reinforcement Learning for a Two Layer Simulated Robot Architecture., and . Agents, page 168-174. ACM, (1999)Hyperplane Ranking in Simple Genetic Algorithms., , and . ICGA, page 231-238. Morgan Kaufmann, (1995)A Short Tutorial on Reinforcement Learning., and . Intelligent Information Processing, volume 163 of IFIP, page 509-513. Springer, (2004)Reinforcement learning for closed-loop propofol anesthesia: a study in human volunteers., , , , , and . J. Mach. Learn. Res., 15 (1): 655-696 (2014)