Sciweavers

324 search results - page 12 / 65
» Bounds for Functions of Dependent Risks
Sort
View
BPM
2008
Springer
164views Business» more  BPM 2008»
15 years 1 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
ALT
2010
Springer
15 years 1 months ago
Distribution-Dependent PAC-Bayes Priors
We further develop the idea that the PAC-Bayes prior can be informed by the data-generating distribution. We prove sharp bounds for an existing framework of Gibbs algorithms, and ...
Guy Lever, François Laviolette, John Shawe-...
66
Voted
CORR
2008
Springer
64views Education» more  CORR 2008»
14 years 12 months ago
Linearly Parameterized Bandits
We consider bandit problems involving a large (possibly infinite) collection of arms, in which the expected reward of each arm is a linear function of an r-dimensional random vect...
Paat Rusmevichientong, John N. Tsitsiklis
CSR
2011
Springer
14 years 3 months ago
The Complexity of Inversion of Explicit Goldreich's Function by DPLL Algorithms
The Goldreich’s function has n binary inputs and n binary outputs. Every output depends on d inputs and is computed from them by the fixed predicate of arity d. Every Goldreich...
Dmitry Itsykson, Dmitry Sokolov
ESA
2005
Springer
99views Algorithms» more  ESA 2005»
15 years 5 months ago
Optimizing a 2D Function Satisfying Unimodality Properties
The number of probes needed by the best possible algorithm for locally or globally optimizing a bivariate function varies substantially depending on the assumptions made about the ...
Erik D. Demaine, Stefan Langerman