Author of the publication

A Novel State Space Exploration Method for the Sparse-Reward Reinforcement Learning Environment.

, , , , , , and . SGAI Conf., volume 14381 of Lecture Notes in Computer Science, page 216-221. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform., , , and . ICCCN, page 1-5. IEEE, (2011)Extrinsic calibration of a laser range finder and a camera based on the automatic detection of line feature., , , and . CISP-BMEI, page 448-453. IEEE, (2016)Adaptive Sliding Mode Control Based on Disturbance Observer for Placement Pressure Control System., , and . Symmetry, 12 (6): 1057 (2020)Patient Positioning in Radiotherapy., , , , and . MeMeA, page 1-6. IEEE, (2020)Hopf bifurcation Control for an Internet Congestion Model., and . Int. J. Bifurc. Chaos, 15 (8): 2643-2651 (2005)Web service QoS prediction: when collaborative filtering meets data fluctuating in big-range., , , , and . World Wide Web, 23 (3): 1715-1740 (2020)Non-negative Tucker decomposition with graph regularization and smooth constraint for clustering., , and . Pattern Recognit., (April 2024)A dynamic VM consolidation approach based on load balancing using Pearson correlation in cloud computing., , and . J. Supercomput., 77 (6): 5840-5881 (2021)Conflict driven scan chain configuration for high transition fault coverage and low test power., , and . ASP-DAC, page 666-671. IEEE, (2009)Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System., , , and . FSKD, volume 4223 of Lecture Notes in Computer Science, page 743-752. Springer, (2006)