Author of the publication

"Good Robot! Now Watch This!": Repurposing Reinforcement Learning for Task-to-Task Transfer.

, , , , , , and . CoRL, volume 164 of Proceedings of Machine Learning Research, page 1564-1574. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced VIP Algorithms for Forwarding, Caching, and Congestion Control in Named Data Networks., , , and . GLOBECOM, page 1-7. IEEE, (2016)A memetic algorithm for optimization of combination chemotherapy with dose adjustment., , and . CASE, page 207-212. IEEE, (2017)Study on Virtual Camera with Preset Shot Types Based on Composition Aesthetic Computing., and . Trans. Edutainment, (2017)Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement., , and . EDM, page 436-441. International Educational Data Mining Society (IEDMS), (2016)A Two-Factor Authentication Scheme based on Negative Databases., , and . SSCI, page 1110-1115. IEEE, (2018)SSMalloc: a low-latency, locality-conscious memory allocator with stable performance scalability., and . APSys, page 15. ACM, (2012)Systematic Review of Dynamic Multi-Object Identification and Localization: Techniques and Technologies., , , , and . IEEE Access, (2021)EasyAPPos: Positioning Wi-Fi Access Points by Using a Mobile Phone., , , , and . IEEE Internet Things J., 10 (15): 13385-13400 (August 2023)N-DISE: NDN-based data distribution for large-scale data-intensive science., , , , , , , , , and 9 other author(s). ICN, page 103-113. ACM, (2022)Negative Survey-Based Privacy Protection of Cloud Data., and . ICSI (2), volume 9141 of Lecture Notes in Computer Science, page 151-159. Springer, (2015)