Results 61 to 70 of about 2,392,451 (238)
Search Complementarities, Aggregate Fluctuations, and Fiscal Policy [PDF]
Abstract We document five novel facts about the role of search effort in forming trading relationships among firms by combining a variety of micro and macro datasets. These facts strongly suggest the presence of search complementarities.
Fernández-Villaverde, Jesús +3 more
openaire +6 more sources
This study evaluates various evolutionary search methods to direct neural controller evolution in company with policy (behavior) transfer across increasingly complex collective robotic (RoboCup keep-away) tasks.
Geoff Nitschke, Sabre Didi
doaj +1 more source
Policy Search for Path Integral Control [PDF]
Comunicació presentada a la European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2014), celebrada els dies 15 a 19 de setembre de 2014 a Nancy, França.
Gomez, Vincenc +3 more
openaire +3 more sources
Gradient-Aware Model-Based Policy Search
Traditional model-based reinforcement learning approaches learn a model of the environment dynamics without explicitly considering how it will be used by the agent. In the presence of misspecified model classes, this can lead to poor estimates, as some relevant available information is ignored.
Pierluca D'Oro +4 more
openaire +4 more sources
In search of an exchange rate policy for the dollar
Following the collapse of the Bretton Woods system of fixed exchange rates in 1971, an agreement on the basic principles of a new exchange rate system could not be reached. Many monetary authorities continue to hope that it will ultimately be possible to
T. DE VRIES
doaj +1 more source
A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
Attribute-based keyword search (ABKS), as an important type of searchable encryption, has been widely utilized for secure cloud storage. In a key-policy attribute-based temporary keyword search (KP-ABTKS) scheme, a private key is associated with an ...
Kai Zhang +4 more
doaj +1 more source
Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing
A growing number of organizations and individuals outsource their data to the cloud. As the cloud service provider is potentially untrustworthy, cloud user needs to encrypt their sensitive data before outsourcing.
Tao Peng +4 more
doaj +1 more source
BackgroundTo improve working conditions and prevent illness and deaths related to overwork, the Taiwanese government in 2015, 2016, and 2018 amended regulations regarding working time, overtime, shifts, and rest days.
Lin, Ro-Ting +2 more
doaj +1 more source
Waarom ouders deelnemen aan professionele opvoedingsondersteuning. Participatie van ouders in Triple P TienersOpvoedprogramma’s worden steeds meer als interventie gebruikt ter ondersteuning van ouders die zorgen en vragen hebben over de ontwikkeling en ...
Pauline Naber +2 more
doaj +1 more source

