4,116 research outputs found
A Neural Networks Committee for the Contextual Bandit Problem
This paper presents a new contextual bandit algorithm, NeuralBandit, which
does not need hypothesis on stationarity of contexts and rewards. Several
neural networks are trained to modelize the value of rewards knowing the
context. Two variants, based on multi-experts approach, are proposed to choose
online the parameters of multi-layer perceptrons. The proposed algorithms are
successfully tested on a large dataset with and without stationarity of
rewards.Comment: 21st International Conference on Neural Information Processin
Analysis and design of a flat central finned-tube radiator
Computer program based on fixed conductance parameter yields minimum weight design. Second program employs variable conductance parameter and variable ratio of fin length to tube outside radius, and is used for radiator designs with geometric limitations. Major outputs of the two programs are given
Bootstrapping Monte Carlo Tree Search with an Imperfect Heuristic
We consider the problem of using a heuristic policy to improve the value
approximation by the Upper Confidence Bound applied in Trees (UCT) algorithm in
non-adversarial settings such as planning with large-state space Markov
Decision Processes. Current improvements to UCT focus on either changing the
action selection formula at the internal nodes or the rollout policy at the
leaf nodes of the search tree. In this work, we propose to add an auxiliary arm
to each of the internal nodes, and always use the heuristic policy to roll out
simulations at the auxiliary arms. The method aims to get fast convergence to
optimal values at states where the heuristic policy is optimal, while retaining
similar approximation as the original UCT in other states. We show that
bootstrapping with the proposed method in the new algorithm, UCT-Aux, performs
better compared to the original UCT algorithm and its variants in two benchmark
experiment settings. We also examine conditions under which UCT-Aux works well.Comment: 16 pages, accepted for presentation at ECML'1
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Search engines are the prevalently used tools to collect information about
individuals on the Internet. Search results typically comprise a variety of
sources that contain personal information -- either intentionally released by
the person herself, or unintentionally leaked or published by third parties,
often with detrimental effects on the individual's privacy. To grant
individuals the ability to regain control over their disseminated personal
information, the European Court of Justice recently ruled that EU citizens have
a right to be forgotten in the sense that indexing systems, must offer them
technical means to request removal of links from search results that point to
sources violating their data protection rights. As of now, these technical
means consist of a web form that requires a user to manually identify all
relevant links upfront and to insert them into the web form, followed by a
manual evaluation by employees of the indexing system to assess if the request
is eligible and lawful.
We propose a universal framework Oblivion to support the automation of the
right to be forgotten in a scalable, provable and privacy-preserving manner.
First, Oblivion enables a user to automatically find and tag her disseminated
personal information using natural language processing and image recognition
techniques and file a request in a privacy-preserving manner. Second, Oblivion
provides indexing systems with an automated and provable eligibility mechanism,
asserting that the author of a request is indeed affected by an online
resource. The automated ligibility proof ensures censorship-resistance so that
only legitimately affected individuals can request the removal of corresponding
links from search results. We have conducted comprehensive evaluations, showing
that Oblivion is capable of handling 278 removal requests per second, and is
hence suitable for large-scale deployment
Avaliação do crescimento de mudas de Eucalyptus benthamii após o uso de Bacsol®.
Em função do crescente plantio de Eucalyptus benthamii em regiões frias, existe grande demanda por mudas, contudo esta espécie apresenta dificuldades no seu desenvolvimento. Para contornar este tipo de problema, alguns produtos biotecnológicos têm sido usados para estimular o crescimento de mudas. Assim, o objetivo deste trabalho foi avaliar o uso do produto biotecnológico Bacsol® para aumentar o crescimento de mudas de E. benthamii. Este produto é um formulado constituído em sua maioria por esporos bacterianos, que atua como agente estimulador do crescimento de plantas, permitindo que cresçam em menor tempo e com uma melhor qualidade. Para este experimento utilizou-se um delineamento de blocos ao acaso, contendo cinco tratamentos e cada tratamento com 240 mudas, sendo uma testemunha e as doses crescentes do produto (0,5 g; 1 g; 1,5 g; 2 g/muda), em três blocos. Os resultados mostraram que houve aumento significativo da altura das mudas de acordo com o aumento da dosagem do produto (p < 0,001).Resumo expandido
Discretization of continuous-time arbitrage strategies in financial markets with fractional Brownian motion
This study evaluates the practical usefulness of continuous-time arbitrage
strategies designed to exploit serial correlation in fractional financial
markets. Specifically, we revisit the strategies of \cite{Shiryaev1998} and
\cite{Salopek1998} and transfer them to a real-world setting by distretizing
their dynamics and introducing transaction costs. In Monte Carlo simulations
with various market and trading parameter settings, we show that both are
highly promising with respect to terminal portfolio values and loss
probabilities. These features and complementary sparsity make them valuable
additions to the toolkit of quantitative investors.Comment: 32 pages, 15 figure
- …