Search

Your search keyword '"Génie Informatique"' showing total 3,182 results

Search Constraints

Start Over You searched for: Author "Génie Informatique" Remove constraint Author: "Génie Informatique"
3,182 results on '"Génie Informatique"'

Search Results

1. D-mannitol crystalline phase characterization using femtosecond laser time-domain terahertz spectroscopy

2. Management decision-aiding with a fuzzy integral based Performance Measurement System

3. The Contribution concept for the control of a manufacturing multi-criteria performance improvement

4. Global, regional, and national comparative risk assessment of 79 behavioural, environmental and occupational, and metabolic risks or clusters of risks in 188 countries, 1990-2013

5. Memory Bandits: Towards the Switching Bandit Problem Best Resolution

6. Memory Bandits: a Bayesian approach for the Switching Bandit Problem

7. Agent Based Modeling Architecture with BPMN And DEVS Network

8. Erratum to 'Predominance of healthcare-associated cases among episodes of community-onset bacteraemia due to extended-spectrum β-lactamase-producing Enterobacteriaceae' [International Journal of Antimicrobial Agents 49/1 67-73]

9. Sparse hierarchical interaction learning with epigraphical projection

10. Building Hierarchical Component Directories

11. Contribution to an equipped approach for the design of executable, verifiable and interoperable Domain Specific Modelling Languages for Model Based Systems Engineering

12. Contribution to an equipped approach for the design of executable, verifiable and interoperable Domain Specific Modelling Languages for Model Based Systems Engineering

13. Nonparametric multiple change point estimation in highly dependent time series

14. Uniform hypothesis testing for finite-valued stationary processes

15. A Learning Algorithm for Change Impact Prediction: Experimentation on 7 Java Applications

16. Allocation séquentielle de ressources dans le modèle de bandit linéaire

17. Adaptive Neural Network Control of a Compact Bionic Handling Arm

18. An innovative subdivision-ICP registration method for tool-path correction applied to deformed aircraft parts machining

19. Nonparametric Statistical Inference for Ergodic Processes

20. Natural actor–critic algorithms

21. Multifractal Random Walks as Fractional Wiener Integrals

22. Asymptotically optimal perfect steganographic systems

23. Bayesian Inference for Linear Dynamic Models With Dirichlet Process Mixtures

24. Simultaneous optimistic optimization on the noiseless BBOB testbed

25. Multilevel Agent-Based Modeling of System of Systems

26. An online support vector machine for abnormal events detection

27. Bayesian analysis of polyphonic western tonal music

28. Évaluation par les données d'algorithmes de bandits contextuels avec applications à la recommandation dynamique

29. Best-Arm Identification in Linear Bandits

30. Exploiting easy data in online optimization

31. Extreme bandits

32. Efficient learning by implicit exploration in bandit problems with side observations

33. Sparse Multi-task Reinforcement Learning

34. Preference-based reinforcement learning: evolutionary direct policy search using a preference-based racing algorithm

35. Subspace identification for predictive state representation by nuclear norm minimization

36. Conflicts Versus Analytical Redundancy Relations: A Comparative Analysis of the Model Based Diagnosis Approach From the Artificial Intelligence and Automatic Control Perspectives

37. Simulation and Optimisation of a Failure-Prone Disassembly-Reconditioning-Assembly System

38. Multi-Objective Deep Q-Networks for Domestic Hot Water Systems Control

39. Adaptive Feature Selection for Object Tracking with Particle Filter

40. Selecting Near-Optimal Approximate State Representations in Reinforcement Learning

41. Predicting when to laugh with structured classification

42. A diffusion strategy for distributed dictionary learning

43. Sodium boiling Detection in a LMFBR Using Autoregressive Models and SVM

44. Biclique Coverings, Rectifier Networks and the Cost of ε-Removal

45. Spectral Bandits for Smooth Graph Functions with Applications in Recommender Systems

46. PAC Rank Elicitation through Adaptive Sampling of Stochastic Pairwise Preferences

47. Bandits Warm-up Cold Recommender Systems

48. Bandits attack function optimization

49. Benthic sensitive habitat mapping: a new tool for ecosystem management ?

50. Mining Software Engineering Datafor Useful Knowledge

Catalog

Books, media, physical & digital resources