The 2010 International Joint Conference on Neural Networks (IJCNN) 2010
DOI: 10.1109/ijcnn.2010.5596815
|View full text |Cite
|
Sign up to set email alerts
|

Exploration vs. exploitation in active learning : A Bayesian approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 7 publications
0
23
0
Order By: Relevance
“…Therefore an explorationexploitation method with a large proportion of random sampling during the early queries is adopted. Some authors also consider combining different criteria [9], [10] or selecting the strategies adaptively for a better performance. [8], [11], [12] perform adaptive strategy selection by connecting the selection problem to multi-arm bandit methods.…”
Section: B Active Learningmentioning
confidence: 99%
“…Therefore an explorationexploitation method with a large proportion of random sampling during the early queries is adopted. Some authors also consider combining different criteria [9], [10] or selecting the strategies adaptively for a better performance. [8], [11], [12] perform adaptive strategy selection by connecting the selection problem to multi-arm bandit methods.…”
Section: B Active Learningmentioning
confidence: 99%
“…[3,6,23]), which is central in motivating our approach. As an example for algorithms that conduct merely refinement, we consider 'SIMPLE' [28].…”
Section: Related Workmentioning
confidence: 99%
“…In a slightly different view, it is equivalent to the iterative application of the kernel (1) on the characteristic vector χ, while restarting χ l to Y l after each iteration. Its probabilistic justification is in the random walk framework (6), which leads to classification. The summary of the label diffusion algorithm DiffuseLabels is given in Fig.…”
Section: Classification Via Diffusion Kernelsmentioning
confidence: 99%
See 1 more Smart Citation
“…So, the initial sets of feedback play a significant role to the model's configuration hence, the model may risks suffering from the positive reinforcement phenomenon. In other words, high influence of the current model to select patterns for obtaining the user's feedback in the next iteration is similar to exploitation in active learning [7]. It sometimes makes the predictive model represents some areas of the pattern space, making it sub-optimal over the entire pattern space.…”
Section: Introductionmentioning
confidence: 99%