Search Results for author: Jade Freeman

Found 6 papers, 1 papers with code

TopoNav: Topological Navigation for Efficient Exploration in Sparse Reward Environments

no code implementations6 Feb 2024 Jumman Hossain, Abu-Zaher Faridee, Nirmalya Roy, Jade Freeman, Timothy Gregory, Theron T. Trout

Additionally, TopoNav incorporates intrinsic motivation to guide exploration toward relevant regions and frontier nodes in the topological map, addressing the challenges of sparse extrinsic rewards.

Efficient Exploration Hierarchical Reinforcement Learning

HeteroEdge: Addressing Asymmetry in Heterogeneous Collaborative Autonomous Systems

no code implementations5 May 2023 Mohammad Saeid Anwar, Emon Dey, Maloy Kumar Devnath, Indrajeet Ghosh, Naima Khan, Jade Freeman, Timothy Gregory, Niranjan Suri, Kasthuri Jayaraja, Sreenivasan Ramasamy Ramamurthy, Nirmalya Roy

Finally, we propose and optimize a novel parameter split-ratio, which indicates the proportion of the data required to be offloaded to another device while considering the networking bandwidth, busy factor, memory (CPU, GPU, RAM), and power constraints of the devices in the testbed.

Object Recognition

An Edge-Cloud Integrated Framework for Flexible and Dynamic Stream Analytics

no code implementations10 May 2022 Xin Wang, Azim Khan, Jianwu Wang, Aryya Gangopadhyay, Carl E. Busart, Jade Freeman

In this paper, we study how to best leverage edge and cloud resources to achieve better accuracy and latency for stream analytics using a type of RNN model called long short-term memory (LSTM).

Cloud Computing Edge-computing +3

Top-K Ranking Deep Contextual Bandits for Information Selection Systems

no code implementations28 Jan 2022 Jade Freeman, Michael Rawson

Contextual multi-armed bandit has been widely used for learning to filter contents and prioritize according to user interest or relevance.

Multi-Armed Bandits

Reproducible and Portable Big Data Analytics in the Cloud

1 code implementation17 Dec 2021 Xin Wang, Pei Guo, Xingyan Li, Aryya Gangopadhyay, Carl E. Busart, Jade Freeman, Jianwu Wang

To tackle these problems, we leverage serverless computing and containerization techniques for automated scalable execution and reproducibility, and utilize the adapter design pattern to enable application portability and reproducibility across different clouds.

Cloud Computing Descriptive

Deep Upper Confidence Bound Algorithm for Contextual Bandit Ranking of Information Selection

no code implementations8 Oct 2021 Michael Rawson, Jade Freeman

Contextual multi-armed bandits (CMAB) have been widely used for learning to filter and prioritize information according to a user's interest.

Multi-Armed Bandits

Cannot find the paper you are looking for? You can Submit a new open access paper.