Sciweavers

649 search results - page 45 / 130
» An Improved Construction of Progression-Free Sets
Sort
View
LATINCRYPT
2010
14 years 11 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
CORR
2010
Springer
72views Education» more  CORR 2010»
14 years 9 months ago
X-Armed Bandits
We consider a generalization of stochastic bandit problems where the set of arms, X, is allowed to be a generic topological space. We constraint the mean-payoff function with a di...
Sébastien Bubeck, Rémi Munos, Gilles...
121
Voted
WWW
2011
ACM
14 years 7 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco
98
Voted
INTERSPEECH
2010
14 years 7 months ago
Learning a language model from continuous speech
This paper presents a new approach to language model construction, learning a language model not from text, but directly from continuous speech. A phoneme lattice is created using...
Graham Neubig, Masato Mimura, Shinsuke Mori, Tatsu...
PROMISE
2010
14 years 7 months ago
The relationship between search based software engineering and predictive modeling
Search Based Software Engineering (SBSE) is an approach to software engineering in which search based optimization algorithms are used to identify optimal or near optimal solution...
Mark Harman