Sciweavers

549 search results - page 82 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
ICML
2009
IEEE
16 years 2 months ago
Near-Bayesian exploration in polynomial time
We consider the exploration/exploitation problem in reinforcement learning (RL). The Bayesian approach to model-based RL offers an elegant solution to this problem, by considering...
J. Zico Kolter, Andrew Y. Ng
PODS
2004
ACM
98views Database» more  PODS 2004»
16 years 2 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
BPM
2007
Springer
201views Business» more  BPM 2007»
15 years 8 months ago
Towards Formal Analysis of Artifact-Centric Business Process Models
Abstract. Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that we...
Kamal Bhattacharya, Cagdas Evren Gerede, Richard H...
WINE
2005
Springer
122views Economy» more  WINE 2005»
15 years 7 months ago
Walrasian Equilibrium: Hardness, Approximations and Tractable Instances
We study the complexity issues for Walrasian equilibrium in a special case of combinatorial auction, called single-minded auction, in which every participant is interested in only ...
Ning Chen, Atri Rudra
PODS
2010
ACM
249views Database» more  PODS 2010»
15 years 7 months ago
Semantic query optimization in the presence of types
Both semantic and type-based query optimization rely on the idea that queries often exhibit non-trivial rewritings if the state space of the database is restricted. Despite their ...
Michael Meier 0002, Michael Schmidt, Fang Wei, Geo...