Sciweavers

5634 search results - page 953 / 1127
» About Abstract Classes
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Logarithmic weak regret of non-Bayesian restless multi-armed bandit
Abstract—We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. At each time, a player chooses K out of N (N > K) arms to play. The state of each ar...
Haoyang Liu, Keqin Liu, Qing Zhao
170
Voted
ISCAS
2011
IEEE
261views Hardware» more  ISCAS 2011»
14 years 8 months ago
Hardware synchronization for embedded multi-core processors
Abstract— Multi-core processors are about to conquer embedded systems — it is not the question of whether they are coming but how the architectures of the microcontrollers shou...
Christian Stoif, Martin Schoeberl, Benito Liccardi...
167
Voted
CISS
2010
IEEE
14 years 8 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
160
Voted
AIED
2011
Springer
14 years 8 months ago
Peering Inside Peer Review with Bayesian Models
Abstract. Instructors and students would benefit more from computersupported peer review, if instructors received information on how well students have understood the conceptual is...
Ilya M. Goldin, Kevin D. Ashley
174
Voted
CSR
2011
Springer
14 years 8 months ago
Improving the Space-Bounded Version of Muchnik's Conditional Complexity Theorem via "Naive" Derandomization
Abstract. Many theorems about Kolmogorov complexity rely on existence of combinatorial objects with specific properties. Usually the probabilistic method gives such objects with b...
Daniil Musatov