Picture for Bobak Shahriari

Bobak Shahriari

Dima

Making Efficient Use of Demonstrations to Solve Hard Exploration Problems

Add code
Sep 03, 2019
Figure 1 for Making Efficient Use of Demonstrations to Solve Hard Exploration Problems
Figure 2 for Making Efficient Use of Demonstrations to Solve Hard Exploration Problems
Figure 3 for Making Efficient Use of Demonstrations to Solve Hard Exploration Problems
Figure 4 for Making Efficient Use of Demonstrations to Solve Hard Exploration Problems
Viaarxiv icon

Which Learning Algorithms Can Generalize Identity-Based Rules to Novel Inputs?

Add code
May 12, 2016
Figure 1 for Which Learning Algorithms Can Generalize Identity-Based Rules to Novel Inputs?
Figure 2 for Which Learning Algorithms Can Generalize Identity-Based Rules to Novel Inputs?
Figure 3 for Which Learning Algorithms Can Generalize Identity-Based Rules to Novel Inputs?
Viaarxiv icon

Unbounded Bayesian Optimization via Regularization

Add code
Aug 14, 2015
Figure 1 for Unbounded Bayesian Optimization via Regularization
Figure 2 for Unbounded Bayesian Optimization via Regularization
Figure 3 for Unbounded Bayesian Optimization via Regularization
Figure 4 for Unbounded Bayesian Optimization via Regularization
Viaarxiv icon

An Entropy Search Portfolio for Bayesian Optimization

Add code
Mar 04, 2015
Figure 1 for An Entropy Search Portfolio for Bayesian Optimization
Figure 2 for An Entropy Search Portfolio for Bayesian Optimization
Figure 3 for An Entropy Search Portfolio for Bayesian Optimization
Viaarxiv icon

Heteroscedastic Treed Bayesian Optimisation

Add code
Mar 04, 2015
Figure 1 for Heteroscedastic Treed Bayesian Optimisation
Figure 2 for Heteroscedastic Treed Bayesian Optimisation
Figure 3 for Heteroscedastic Treed Bayesian Optimisation
Figure 4 for Heteroscedastic Treed Bayesian Optimisation
Viaarxiv icon

Exploiting correlation and budget constraints in Bayesian multi-armed bandit optimization

Add code
Nov 11, 2013
Figure 1 for Exploiting correlation and budget constraints in Bayesian multi-armed bandit optimization
Figure 2 for Exploiting correlation and budget constraints in Bayesian multi-armed bandit optimization
Figure 3 for Exploiting correlation and budget constraints in Bayesian multi-armed bandit optimization
Figure 4 for Exploiting correlation and budget constraints in Bayesian multi-armed bandit optimization
Viaarxiv icon