Sciweavers

557 search results - page 66 / 112
» Comparisons of keystroke-level model predictions to observed...
Sort
View
NIPS
2001
15 years 1 months ago
Model-Free Least-Squares Policy Iteration
We propose a new approach to reinforcement learning which combines least squares function approximation with policy iteration. Our method is model-free and completely off policy. ...
Michail G. Lagoudakis, Ronald Parr
BMCBI
2007
141views more  BMCBI 2007»
14 years 12 months ago
Reconstruction of human protein interolog network using evolutionary conserved network
Background: The recent increase in the use of high-throughput two-hybrid analysis has generated large quantities of data on protein interactions. Specifically, the availability of...
Tao-Wei Huang, Chung-Yen Lin, Cheng-Yan Kao
CCR
2010
202views more  CCR 2010»
14 years 12 months ago
Understanding data center traffic characteristics
As data centers become more and more central in Internet communications, both research and operations communities have begun to explore how to better design and manage them. In th...
Theophilus Benson, Ashok Anand, Aditya Akella, Min...
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
15 years 1 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 1 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan