Near optimal behavior via approximate state abstraction

D Abel, D Hershkowitz… - … Conference on Machine …, 2016 - proceedings.mlr.press
The combinatorial explosion that plagues planning and reinforcement learning (RL)
algorithms can be moderated using state abstraction. Prohibitively large task …

Dynamic product portfolio management with life cycle considerations

RW Seifert, JS Tancrez, I Biçer - International Journal of Production …, 2016 - Elsevier
We consider a portfolio of products in which each product probabilistically transitions
through various life cycle stages. The evolution through these life cycle stages is impacted …

A probabilistic approach to autonomic security management

S Iannucci, S Abdelwahed - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Intrusion Response Systems (IRSs) have been a major research topic in the last decade. At
the core of an IRS is the response selection algorithm, which selects the best response …

QoS provisioning based resource allocation for energy harvesting systems

RA Loodaricheh, S Mallick… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose quality-of-service (QoS) based resource allocation (RA) schemes
for energy harvesting (EH) systems. We consider a system model with a single source and …

Multi-time scale procurement planning considering multiple suppliers and uncertainty in supply and demand

J Shin, JH Lee - Computers & Chemical Engineering, 2016 - Elsevier
Inventory management of procurement system is decomposed into sub-problems according
to the timescale of decisions: the long-term planning for ordering raw materials and the short …

Randomised procedures for initialising and switching actions in policy iteration

S Kalyanakrishnan, N Misra, A Gopalan - Proceedings of the AAAI …, 2016 - ojs.aaai.org
Abstract Policy Iteration (PI)(Howard 1960) is a classical method for computing an optimal
policy for a finite Markov Decision Problem (MDP). The method is conceptually simple …

Optimal wireless energy charging for incentivized content transfer in mobile publish–subscribe networks

Y Zhang, D Niyato, P Wang, DI Kim… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In mobile social networks, mobile users may help each other transfer contents when they
move and meet each other. In this paper, we consider a mobile publish-subscribe network in …

Optimal monitor placement for detection of persistent threats

K Khalil, Z Qian, P Yu, S Krishnamurthy… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
We study optimal monitor placement for intrusion detection in networks with persistent
attackers. The problem is modeled as a stochastic game in which the attacker attempts to …

Software pipelining at runtime

H Rong, P Hyunchul, Y Wu - US Patent 9,239,712, 2016 - Google Patents
Apparatuses and methods may provide for determining a level of performance for
processing one or more loops by a dynamic compiler and executing code optimizations to …

[PDF][PDF] Batch-Switching Policy Iteration.

S Kalyanakrishnan, U Mall, R Goyal - IJCAI, 2016 - ijcai.org
Policy Iteration (PI) is a widely-used family of algorithms for computing an optimal policy for a
given Markov Decision Problem (MDP). Starting with an arbitrary initial policy, PI repeatedly …