Sciweavers

4544 search results - page 752 / 909
» Reinforcement Learning with Time
Sort
View
128
Voted
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 4 months ago
New degree bounds for polynomial threshold functions
A real multivariate polynomial p(x1, . . . , xn) is said to sign-represent a Boolean function f : {0, 1}n {-1, 1} if the sign of p(x) equals f(x) for all inputs x {0, 1}n. We gi...
Ryan O'Donnell, Rocco A. Servedio
137
Voted
OSDI
2004
ACM
16 years 4 months ago
Program-Counter-Based Pattern Classification in Buffer Caching
Program-counter-based (PC-based) prediction techniques have been shown to be highly effective and are widely used in computer architecture design. In this paper, we explore the op...
Chris Gniady, Ali Raza Butt, Y. Charlie Hu
ICIAP
2005
ACM
16 years 4 months ago
Interactive, Mobile, Distributed Pattern Recognition
As the accuracy of conventional classifiers, based only on a static partitioning of feature space, appears to be approaching a limit, it may be useful to consider alternative appro...
George Nagy
ICDE
2010
IEEE
292views Database» more  ICDE 2010»
16 years 4 months ago
Usher: Improving Data Quality With Dynamic Forms
Data quality is a critical problem in modern databases. Data entry forms present the first and arguably best opportunity for detecting and mitigating errors, but there has been li...
Kuang Chen, Harr Chen, Neil Conway, Joseph M. Hell...
PERCOM
2005
ACM
16 years 4 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang