-
Policy Search
- [ ] [PI2](http://proceedings.mlr.press/v9/theodorou10a/theodorou10a.pdf), is already implemented #28
- [ ] [PoWER](http://www.ias.informatik.tu-darmstadt.de/publications/peters_ADPR…
-
At some point we thinking about having reinforcement learning and/or neuro-evolution-style reinforcement learning examples in ml5. Some references:
With Genetic Algorithms and vanilla JS neural net…
-
Often we talk about incremental code evolution we should consider more often decrementing code
reducing dependencies here are some strategies that are efficient in the ECMAScript world.
rollup int…
-
- Two main data generation strategies: (1) amplicon sequencing and (2) shotgun sequencing
- At this time analysis one can choose calling variants or performing within-host evolution analyses inclu…
-
Appreciate this excellent work. I got a lot of inspiration from this work.
I have achieved to train an AI for a more difficult version flappy bird: the horizontal distance between adjacent pipes an…
-
# Data Privacy Risk Assessment for Elementary School
## 1. Executive Summary
The purpose of this assessment is to identify, evaluate, and mitigate potential data privacy risks in an elementary sch…
-
_From [lar...@gmail.com](https://code.google.com/u/106380900043315593284/) on October 22, 2013 15:28:47_
If we support other evolutionary algorithms ( issue 136 ) we should also let the user control …
-
**Is your feature request related to a problem? Please describe.**
To efficiently simulate systems beyond a few dozen qubits, alternative methods are necessary due to the exponential increase in co…
-
To evaluate the behavior of the two agent types—**IndividualAgent** (competitive, individualistic behavior) and **SystemAgent** (collaborative, cooperative behavior)—design a series of experiments tha…
-
### Enhancement Description
- One-line enhancement description (can be used as a release note): Add `EnforcedRollingUpdate` to statefulset rolling update strategies
- Kubernetes Enhancement Propos…