Sciweavers

9425 search results - page 1635 / 1885
» Some Notes on Models and Modelling
Sort
View
163
Voted
JMLR
2010
143views more  JMLR 2010»
15 years 2 months ago
A Quasi-Newton Approach to Nonsmooth Convex Optimization Problems in Machine Learning
We extend the well-known BFGS quasi-Newton method and its memory-limited variant LBFGS to the optimization of nonsmooth convex objectives. This is done in a rigorous fashion by ge...
Jin Yu, S. V. N. Vishwanathan, Simon Günter, ...
145
Voted
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 2 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...
MACOM
2010
15 years 2 months ago
Static Inter-Cell Interference Coordination Techniques for LTE Networks: A Fair Performance Assessment
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...
David González González, Mario Garc&...
118
Voted
MANSCI
2010
80views more  MANSCI 2010»
15 years 2 months ago
Impossible Frontiers
A key result of the Capital Asset Pricing Model (CAPM) is that the market portfolio— the portfolio of all assets in which each asset’s weight is proportional to its total mark...
Thomas J. Brennan, Andrew W. Lo
MIDDLEWARE
2010
Springer
15 years 2 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
« Prev « First page 1635 / 1885 Last » Next »