46,148 research outputs found
Generative Exploration and Exploitation
Sparse reward is one of the biggest challenges in reinforcement learning
(RL). In this paper, we propose a novel method called Generative Exploration
and Exploitation (GENE) to overcome sparse reward. GENE automatically generates
start states to encourage the agent to explore the environment and to exploit
received reward signals. GENE can adaptively tradeoff between exploration and
exploitation according to the varying distributions of states experienced by
the agent as the learning progresses. GENE relies on no prior knowledge about
the environment and can be combined with any RL algorithm, no matter on-policy
or off-policy, single-agent or multi-agent. Empirically, we demonstrate that
GENE significantly outperforms existing methods in three tasks with only binary
rewards, including Maze, Maze Ant, and Cooperative Navigation. Ablation studies
verify the emergence of progressive exploration and automatic reversing.Comment: AAAI'2
In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network
Over the past decade, online social networks (OSNs) such as Twitter and
Facebook have thrived and experienced rapid growth to over 1 billion users. A
major evolution would be to leverage the characteristics of OSNs to evaluate
the effectiveness of the many routing schemes developed by the research
community in real-world scenarios. In this paper, we showcase the Secure
Opportunistic Schemes (SOS) middleware which allows different routing schemes
to be easily implemented relieving the burden of security and connection
establishment. The feasibility of creating a delay tolerant social network is
demonstrated by using SOS to power AlleyOop Social, a secure delay tolerant
networking research platform that serves as a real-life mobile social
networking application for iOS devices. SOS and AlleyOop Social allow users to
interact, publish messages, and discover others that share common interests in
an intermittent network using Bluetooth, peer-to-peer WiFi, and infrastructure
WiFi.Comment: 6 pages, 4 figures, accepted in ICDCS 2017. arXiv admin note: text
overlap with arXiv:1702.0565
- …