Sciweavers

2392 search results - page 446 / 479
» Matching data dissemination algorithms to application requir...
Sort
View
ICML
2010
IEEE
15 years 26 days ago
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design
Many applications require optimizing an unknown, noisy function that is expensive to evaluate. We formalize this task as a multiarmed bandit problem, where the payoff function is ...
Niranjan Srinivas, Andreas Krause, Sham Kakade, Ma...
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
14 years 12 months ago
Turning enemies into friends: Using reflections to improve sound source localization
Sound Source Localization (SSL) based on microphone arrays has numerous applications, and has received significant research attention. Common to all published research is the obs...
Flavio Ribeiro, Demba E. Ba, Cha Zhang, Dinei A. F...
CORR
2010
Springer
80views Education» more  CORR 2010»
14 years 12 months ago
Multi-path Probabilistic Available Bandwidth Estimation through Bayesian Active Learning
Knowing the largest rate at which data can be sent on an end-to-end path such that the egress rate is equal to the ingress rate with high probability can be very practical when ch...
Frederic Thouin, Mark Coates, Michael Rabbat
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 12 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
DAM
2007
153views more  DAM 2007»
14 years 11 months ago
Computing the minimum number of hybridization events for a consistent evolutionary history
It is now well-documented that the structure of evolutionary relationships between a set of present-day species is not necessarily tree-like. The reason for this is that reticulat...
Magnus Bordewich, Charles Semple