Sciweavers

1016 search results - page 3 / 204
» Explore or Exploit
Sort
View
CVPR
2012
IEEE
11 years 10 months ago
Stream-based Joint Exploration-Exploitation Active Learning
Learning from streams of evolving and unbounded data is an important problem, for example in visual surveillance or internet scale data. For such large and evolving real-world data...
Chen Change Loy, Timothy M. Hospedales, Tao Xiang,...
PVLDB
2010
159views more  PVLDB 2010»
13 years 3 months ago
Explore or Exploit? Effective Strategies for Disambiguating Large Databases
Data ambiguity is inherent in applications such as data integration, location-based services, and sensor monitoring. In many situations, it is possible to “clean”, or remove, ...
Reynold Cheng, Eric Lo, Xuan Yang, Ming-Hay Luk, X...
ICML
2003
IEEE
14 years 6 months ago
Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning
In the task of adaptive information filtering, a system receives a stream of documents but delivers only those that match a person's information need. As the system filters i...
Yi Zhang, Wei Xu, James P. Callan
UM
2007
Springer
13 years 11 months ago
Capturing User Interests by Both Exploitation and Exploration
Personalization is one of the important research issues in the areas of information retrieval and Web search. Providing personalized services that are tailored toward the specific...
Ka Cheung Sia, Shenghuo Zhu, Yun Chi, Koji Hino, B...
ICDM
2005
IEEE
163views Data Mining» more  ICDM 2005»
13 years 11 months ago
Balancing Exploration and Exploitation: A New Algorithm for Active Machine Learning
Active machine learning algorithms are used when large numbers of unlabeled examples are available and getting labels for them is costly (e.g. requiring consulting a human expert)...
Thomas Takeo Osugi, Kun Deng, Stephen D. Scott