Sciweavers

13895 search results - page 298 / 2779
» Exploring
Sort
View
WPES
2003
ACM
15 years 10 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
ASM
2003
ASM
15 years 10 months ago
Partial Updates Exploration II
Yuri Gurevich, Nikolai Tillmann
CAISE
2003
Springer
15 years 10 months ago
Ubiquitous Usability: Exploring Mobile Interfaces within the Context of a Theoretical Model
Mobile commerce (m-Commerce), which allows for anytime/anywhere access to information and services, shows great potential. Ubiquitous access to information systems is critical to e...
Khaled Hassanein, Milena M. Head
COLT
2003
Springer
15 years 10 months ago
Lower Bounds on the Sample Complexity of Exploration in the Multi-armed Bandit Problem
We consider the Multi-armed bandit problem under the PAC (“probably approximately correct”) model. It was shown by Even-Dar et al. [5] that given n arms, it suffices to play th...
Shie Mannor, John N. Tsitsiklis