Sciweavers

2229 search results - page 117 / 446
» The Case for Grounding Databases
Sort
View
ICML
2010
IEEE
15 years 6 months ago
Efficient Selection of Multiple Bandit Arms: Theory and Practice
We consider the general, widely applicable problem of selecting from n real-valued random variables a subset of size m of those with the highest means, based on as few samples as ...
Shivaram Kalyanakrishnan, Peter Stone
ICEBE
2007
IEEE
103views Business» more  ICEBE 2007»
15 years 5 months ago
Value and Goal Driven Design of E-Services
- E-services are used as the cornerstones for modeling interaction points of cooperating IT systems, within and between enterprises. So far, research and development of e-services ...
Martin Henkel, Paul Johannesson, Erik Perjons, Jel...
ISEM
2006
91views more  ISEM 2006»
15 years 5 months ago
Computational experimentations in market and supply-chain co-design: a mixed agent approach
The synthetic environment for analysis and simulations (SEAS) is a computational experimentation environment that mimics real life economies, with multiple interlinked markets, mul...
Alok R. Chaturvedi, Shailendra Raj Mehta, Daniel R...
CPHYSICS
2007
93views more  CPHYSICS 2007»
15 years 5 months ago
Convergence rate of dimension reduction in Bose-Einstein condensates
In this paper, we study dimension reduction of the three-dimensional (3D) Gross–Pitaevskii equation (GPE) modeling Bose–Einstein condensation under different limiting interact...
Weizhu Bao, Yunyi Ge, Dieter Jaksch, Peter A. Mark...
COMCOM
2007
106views more  COMCOM 2007»
15 years 5 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis