{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:24:46Z","timestamp":1725549886497},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290469"},{"type":"electronic","value":"9783540317319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11559221_32","type":"book-chapter","created":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T06:36:05Z","timestamp":1128148565000},"page":"316-325","source":"Crossref","is-referenced-by-count":6,"title":["An Adaptive Approach for the Exploration-Exploitation Dilemma for Learning Agents"],"prefix":"10.1007","author":[{"given":"Lilia","family":"Rejeb","sequence":"first","affiliation":[]},{"given":"Zahia","family":"Guessoum","sequence":"additional","affiliation":[]},{"given":"Rym","family":"M\u2019Hallah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","volume-title":"Exploration vs. exploitation: choosing a supplier in an environment of incomplete information","author":"R. Azoulay-Schwartz","year":"2003","unstructured":"Azoulay-Schwartz, R., Kraus, S., Wilkenfeld, J.: Exploration vs. exploitation: choosing a supplier in an environment of incomplete information. Elsevier Science, Amsterdam (2003)"},{"key":"32_CR2","volume-title":"Handbook of Organizational Change and Development: Evolutionary Dynamics of Organizational Populations and Communities","author":"J.A.C. Baum","year":"1999","unstructured":"Baum, J.A.C., Rao, H.: Handbook of Organizational Change and Development: Evolutionary Dynamics of Organizational Populations and Communities. Oxford University Press, Oxford (1999)"},{"key":"32_CR3","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/s005000100111","volume":"6","author":"M.V. Butz","year":"2002","unstructured":"Butz, M.V., Wilson, S.W.: An algorithmic description of XCS. Journal of Soft Computing\u00a06, 144\u2013153 (2002)","journal-title":"Journal of Soft Computing"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Carmel, D., Markovitch, S.: Exploration Strategies for Model-Based Learning in Multi-agent Systems. In: Jennings, N., Sycara, K., Georgeff, M. (eds.) Autonomous Agents and Multi-agent systems, vol.\u00a02(2), pp. 141\u2013172 (1999)","DOI":"10.1023\/A:1010007108196"},{"key":"32_CR5","volume-title":"Multi-armed bandit allocation indices","author":"J.C. Gittings","year":"1989","unstructured":"Gittings, J.C.: Multi-armed bandit allocation indices. John Wiley and Sons, NY (1989)"},{"key":"32_CR6","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"L.P. Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Moore, A.W.: Reinforcement learning: A survey. Journal of Artificial Intelligence Research\u00a04, 237\u2013285 (1996)","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"2","key":"32_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1023\/A:1007541107674","volume":"35","author":"N. Meuleau","year":"1999","unstructured":"Meuleau, N., Bourgine, P.: Exploration of multi-state environments: Local measure and back-propagation of uncertainty. Machine Learning\u00a035(2), 117\u2013154 (1999)","journal-title":"Machine Learning"},{"key":"32_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-48104-4_7","volume-title":"Advances in Learning Classifier Systems","author":"L. Miramontes Hercog","year":"2002","unstructured":"Miramontes Hercog, L., Fogarty, T.C.: Social Simulation Using a Multi-agent Model Based on Classifier Systems: The emergence of Vacillating Behavior in the \u201dEl Farol\u201d Bar Problem. In: Lanzi, P.L., Stolzmann, W., Wilson, S.W. (eds.) IWLCS 2001. LNCS (LNAI), vol.\u00a02321, pp. 88\u2013111. Springer, Heidelberg (2002)"},{"key":"32_CR9","volume-title":"Proc. AISTA 2004 International Conference on Advances in Intelligent Systems - Theory and Applications","author":"L. Rejeb","year":"2004","unstructured":"Rejeb, L., Guessoum, Z.: Adaptive Firms. In: Proc. AISTA 2004 International Conference on Advances in Intelligent Systems - Theory and Applications. IEEE Computer Society, Luxembourg (2004)"},{"key":"32_CR10","volume-title":"The theory of the growth of the firm","author":"E.T. Penrose","year":"1959","unstructured":"Penrose, E.T.: The theory of the growth of the firm. Basil Blackwell, Malden (1959)"},{"key":"32_CR11","unstructured":"Peres-Uribe, A., Hirsbrunner, B.: The risk of Exploration in multi-agent learning systems: a case study. In: Proc. Agents 2000 Joint workshop on learning agents, Barcelona, June 3\u20137, pp. 33\u201337 (2000)"},{"key":"32_CR12","volume-title":"Reinforcement learning, an introduction","author":"R.S. Sutton","year":"1998","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement learning, an introduction. The MIT Press, Cambridge (1998)"},{"key":"32_CR13","volume-title":"Handbook of Intelligent Control: Neural, Fuzzy and Adaptive Approaches","author":"S.B. Thrun","year":"1992","unstructured":"Thrun, S.B.: The role of exploration in learning control. In: Sofge, D.A. (ed.) Handbook of Intelligent Control: Neural, Fuzzy and Adaptive Approaches, Van Nostrand Reinhold, Florence (1992)"},{"key":"32_CR14","first-page":"279","volume":"8","author":"C. Watkins","year":"1999","unstructured":"Watkins, C., Dayan, P.: Q-Learning. Machine Learning\u00a08, 279\u2013292 (1999)","journal-title":"Machine Learning"},{"key":"32_CR15","unstructured":"Wiering, M.: Explorations in Efficient Reinforcement Learning. Ph.D. thesis (February 1999)"},{"issue":"2","key":"32_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1162\/evco.1995.3.2.149","volume":"3","author":"S.W. Wilson","year":"1995","unstructured":"Wilson, S.W.: Classifiers Fitness Based on Accuracy. Evolutionary computation\u00a03(2), 149\u2013175 (1995)","journal-title":"Evolutionary computation"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Wilson, S.W.: Explore\/Exploit Strategies in Autonomy. In: Maes, P., Mataric, M., Pollac, J., Meyer, J.-A., Wilson, S. (eds.) From Animals to Animats 4, Proc. of the 4th International Conference of Adaptive Behavior, Cambridge (1996)","DOI":"10.7551\/mitpress\/3118.003.0040"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems and Applications IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11559221_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T12:19:31Z","timestamp":1706617171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11559221_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290469","9783540317319"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11559221_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}