Author of the publication

Value Function Transfer for Deep Multi-Agent Reinforcement Learning Based on N-Step Returns.

, , , , and . IJCAI, page 457-463. ijcai.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Theory of BOC Signal Unambiguous Tracking With Two-Dimensional Loops., , , and . IEEE Trans. Aerosp. Electron. Syst., 53 (6): 3056-3069 (2017)Noncontact 3-D Coordinate Measurement of Cross-Cutting Feature Points on the Surface of a Large-Scale Workpiece Based on the Machine Vision Method., and . IEEE Trans. Instrumentation and Measurement, 59 (7): 1874-1887 (2010)Reconstructing Videos From Multiple Compressed Copies., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (9): 1342-1351 (2009)A new motion error extraction method based on RCM trajectory from raw data for motion compensation., , , , and . IGARSS, page 241-244. IEEE, (2012)Global carbon budgets simulated by the Beijing Climate Center Climate System Model for the last century, , , , , , , , , and 13 other author(s). J. Geophys. Res. Atmos., 118 (10): 4326--4347 (May 27, 2013)Interactive Visual Exploration of Halos in Large Scale Cosmology Simulation., , , , and . CoRR, (2014)On Bit Error Performance of Full-Rate Signal Space Cooperative Communication over Nakagami-m Fading Channels., , , and . IEEE Communications Letters, 16 (8): 1224-1227 (2012)Differential Quadrature Amplitude Modulation and Relay Selection with Detect-and-Forward Cooperative Relaying., , and . Wireless Personal Communications, 72 (2): 1399-1414 (2013)Apply ant colony optimization to Tetris., , , , and . GECCO, page 1741-1742. ACM, (2009)Electronic Countermeasures Jamming Resource Optimal Distribution., and . ITITS (2), volume 455 of Advances in Intelligent Systems and Computing, page 113-121. (2015)