Author of the publication

Optimized Look-ahead Tree Search Policies.

, , and . EWRL, volume 7188 of Lecture Notes in Computer Science, page 189-200. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine-Learning Approaches to Power-System Security Assessment.. IEEE Expert, 12 (5): 60-72 (1997)Towards sub-quadratic learning of probability density models in the form of mixtures of trees., , and . ESANN, (2010)A hybrid human-computer approach for large-scale image-based measurements using web services and machine learning., , , , , , , , and . ISBI, page 902-906. IEEE, (2014)Editorial., , , , , and . Signal Processing, 90 (8): 2331-2332 (2010)Batch mode reinforcement learning based on the synthesis of artificial trajectories., , , and . Annals OR, 208 (1): 383-416 (2013)Classifying pairs with trees for supervised biological network inference., , , and . CoRR, (2014)Reinforcement Learning Versus Model Predictive Control: A Comparison on a Power System Problem., , , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 39 (2): 517-529 (2009)Unit Commitment using Nearest Neighbor as a Short-Term Proxy., , , and . CoRR, (2016)Learning Inclusion-Optimal Chordal Graphs, and . CoRR, (2012)Automatic Localization of Interest Points in Zebrafish Images with Tree-Based Methods., , , , , , and . PRIB, volume 7036 of Lecture Notes in Computer Science, page 179-190. Springer, (2011)