A multi-armed bandit episode consists of n trials, each allowing selection of one of K arms, resulting in payoff from a distribution over [0, 1] associated with that arm. We assum...
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
Background: Many practical tasks in biomedicine require accessing specific types of information in scientific literature; e.g. information about the results or conclusions of the ...
Yufan Guo, Anna Korhonen, Maria Liakata, Ilona Sil...
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...