Sciweavers

324 search results - page 12 / 65
» Bounds for Functions of Dependent Risks
Sort
View
BPM
2008
Springer
164views Business» more  BPM 2008»
15 years 3 months ago
Analyzing Business Continuity through a Multi-layers Model
Business Continuity Management (BCM) is a process to manage risks, emergencies, and recovery plans of an organization during a crisis. It results in a document called Business Cont...
Yudistira Asnar, Paolo Giorgini
85
Voted
ALT
2010
Springer
15 years 3 months ago
Distribution-Dependent PAC-Bayes Priors
We further develop the idea that the PAC-Bayes prior can be informed by the data-generating distribution. We prove sharp bounds for an existing framework of Gibbs algorithms, and ...
Guy Lever, François Laviolette, John Shawe-...
83
Voted
CORR
2008
Springer
64views Education» more  CORR 2008»
15 years 1 months ago
Linearly Parameterized Bandits
We consider bandit problems involving a large (possibly infinite) collection of arms, in which the expected reward of each arm is a linear function of an r-dimensional random vect...
Paat Rusmevichientong, John N. Tsitsiklis
CSR
2011
Springer
14 years 5 months ago
The Complexity of Inversion of Explicit Goldreich's Function by DPLL Algorithms
The Goldreich’s function has n binary inputs and n binary outputs. Every output depends on d inputs and is computed from them by the fixed predicate of arity d. Every Goldreich...
Dmitry Itsykson, Dmitry Sokolov
92
Voted
ESA
2005
Springer
99views Algorithms» more  ESA 2005»
15 years 7 months ago
Optimizing a 2D Function Satisfying Unimodality Properties
The number of probes needed by the best possible algorithm for locally or globally optimizing a bivariate function varies substantially depending on the assumptions made about the ...
Erik D. Demaine, Stefan Langerman