Sciweavers

2450 search results - page 224 / 490
» Exploring Unknown Environments
Sort
View
ACSAC
2010
IEEE
15 years 3 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
COLT
2010
Springer
15 years 2 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
153
Voted
EMNLP
2009
15 years 2 months ago
A Comparison of Windowless and Window-Based Computational Association Measures as Predictors of Syntagmatic Human Associations
Distance-based (windowless) word assocation measures have only very recently appeared in the NLP literature and their performance compared to existing windowed or frequency-based ...
Justin Washtell, Katja Markert
ICDM
2009
IEEE
161views Data Mining» more  ICDM 2009»
15 years 2 months ago
Understanding Climate Change Patterns with Multivariate Geovisualization
Climate change has been a challenging and urgent research problem for many related research fields. Climate change trends and patterns are complex, which may involve many factors a...
Hai Jin, Diansheng Guo
TNN
2011
104views more  TNN 2011»
14 years 12 months ago
Extended Input Space Support Vector Machine
—In some applications, the probability of error of a given classifier is too high for its practical application, but we are allowed to gather more independent test samples from ...
Ricardo Santiago-Mozos, Fernando Pérez-Cruz...