The fridge is the most constantly employed menage/ kitchen electrical device encyclopedically for conserving food. The leading sectors of smart widgets include refrigerators in the kitchen. The Web of Effects (IoT) de...
详细信息
This study examines the efficacy of a deep learning-based binaural speech reproduction system via headphones that integrates real-time head tracking to simulate a stable speech source in a virtual environment. We deve...
详细信息
The incorporation of IoT technology into energy-efficient home systems has resulted in a surge in data volume, prompting the need for sophisticated storage and processing solutions. This paper proposes a system that i...
详细信息
Wearable sensing has recently been highly preferred due to its quick and accurate measurement of physiological parameters. These sensors have been devised using various polymers [1], [2] and nanomaterials [3], [4] sui...
详细信息
As space exploration advances, an increasing number of planets are becoming targets for landing missions. Before officially launching a lander, it is essential to conduct landing tests on Earth to verify the functiona...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriving from the opponents’best response(BR),is technically the optimal strategy for the ***,computing an SSE strategy may be difficult since it needs to solve a mixed-integer program and has exponential complexity in the number of *** this end,the authors propose an equalizer ZD strategy,which can unilaterally restrict the opponent’s expected *** authors first study the existence of an equalizer ZD strategy with one-to-one situations,and analyze an upper bound of its performance with the baseline SSE *** the authors turn to multi-player models,where there exists one player adopting an equalizer ZD *** authors give bounds of the weighted sum of opponents’s utilities,and compare it with the SSE ***,the authors give simulations on unmanned aerial vehicles(UAVs)and the moving target defense(MTD)to verify the effectiveness of the proposed approach.
We propose a method of performing variational inference using high speed photonic neural accelerators. This method incurs no slowdown compared to deterministic photonic inference, affecting only the power consumption ...
详细信息
Offline Imitation Learning (IL) with imperfect demonstrations has garnered increasing attention owing to the scarcity of expert data in many real-world domains. A fundamental problem in this scenario is how to extract...
详细信息
Offline Imitation Learning (IL) with imperfect demonstrations has garnered increasing attention owing to the scarcity of expert data in many real-world domains. A fundamental problem in this scenario is how to extract positive behaviors from noisy data. In general, current approaches to the problem select data building on state-action similarity to given expert demonstrations, neglecting precious information in (potentially abundant) diverse state-actions that deviate from expert ones. In this paper, we introduce a simple yet effective data selection method that identifies positive behaviors based on their resultant states - a more informative criterion enabling explicit utilization of dynamics information and effective extraction of both expert and beneficial diverse behaviors. Further, we devise a lightweight behavior cloning algorithm capable of leveraging the expert and selected data correctly. In the experiments, we evaluate our method on a suite of complex and high-dimensional offline IL benchmarks, including continuous-control and vision-based tasks. The results demonstrate that our method achieves state-of-the-art performance, outperforming existing methods on 20/21 benchmarks, typically by 2-5x, while maintaining a comparable runtime to Behavior Cloning (BC). Copyright 2024 by the author(s)
Asymmetric information stochastic games (AISGs) arise in many complex socio-technical systems, such as cyberphysical systems and IT infrastructures. Existing computational methods for AISGs are primarily offline and c...
详细信息
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have...
详细信息
暂无评论