Essays about: "Hindsight"
Showing result 11 - 15 of 29 essays containing the word Hindsight.
-
11. Building a scalable email response system
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis concerns the task of designing and building a system around a natural-language understanding (NLU) bot to help automate email communication, using cloud computing technology. Focus lies on a serverless environment within the Amazon Web Services (AWS) infrastructure. READ MORE
-
12. User Plane Selection for Core Networks using Deep Reinforcement Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Allocating service functions to a core network upon users’ various demands isof importance in 5G networks. In this thesis work, we have studied reinforcementlearning models to solve this allocation problem. READ MORE
-
13. AlphaZero to Alpha Hero : A pre-study on Additional Tree Sampling within Self-Play Reinforcement Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In self-play reinforcement learning an agent plays games against itself and with the help of hindsight and retrospection improves its policy over time. Using this premise, AlphaZero famously managed to become the strongest known Go, Shogi, and Chess entity by training a deep neural network from data collected solely from self-play. READ MORE
-
14. The Selectiveness of Nick Carraway : The Unreliable Narrator in The Great Gatsby
University essay from Högskolan i Jönköping/Högskolan för lärande och kommunikationAbstract : Many scholars have argued back and forth regarding the reliability of the narrator Nick Carraway in F. Scott Fitzgerald’s most well-known novel The Great Gatsby. Nick’s attention to detail in his narrative is the element due to which many scholars argue in favour of his reliability. One of these scholars is Wayne C. READ MORE
-
15. Privacy Preserving Audit Proofs
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The increased dependence on computers for critical tasks demands sufficient and transparent methods to audit its execution. This is commonly solved using logging where the log must not only be resilient against tampering and rewrites in hindsight but also be able to answer queries concerning (non)-membership of events in the log while preserving privacy. READ MORE