Sciweavers

7289 search results - page 1451 / 1458
» A Dependent Set Theory
Sort
View
JMLR
2010
158views more  JMLR 2010»
13 years 2 months ago
Restricted Eigenvalue Properties for Correlated Gaussian Designs
Methods based on 1-relaxation, such as basis pursuit and the Lasso, are very popular for sparse regression in high dimensions. The conditions for success of these methods are now ...
Garvesh Raskutti, Martin J. Wainwright, Bin Yu
JMLR
2010
103views more  JMLR 2010»
13 years 2 months ago
Regret Bounds and Minimax Policies under Partial Monitoring
This work deals with four classical prediction settings, namely full information, bandit, label efficient and bandit label efficient as well as four different notions of regret: p...
Jean-Yves Audibert, Sébastien Bubeck
SIAMJO
2010
155views more  SIAMJO 2010»
13 years 2 months ago
Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters
When liquidating a portfolio of large blocks of risky assets, an institutional investor wants to minimize the cost as well as the risk of execution. An optimal execution strategy ...
Somayeh Moazeni, Thomas F. Coleman, Yuying Li
TCAD
2010
150views more  TCAD 2010»
13 years 2 months ago
Voltage and Temperature Aware Statistical Leakage Analysis Framework Using Artificial Neural Networks
Artificial neural networks (ANNs) have shown great promise in modeling circuit parameters for computer aided design applications. Leakage currents, which depend on process paramete...
Janakiraman Viraraghavan, Bharadwaj Amrutur, V. Vi...
TSP
2010
13 years 2 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao
« Prev « First page 1451 / 1458 Last » Next »