Sciweavers

459 search results - page 37 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
IJPRAI
2002
93views more  IJPRAI 2002»
13 years 7 months ago
Improving Stability of Decision Trees
Decision-tree algorithms are known to be unstable: small variations in the training set can result in different trees and different predictions for the same validation examples. B...
Mark Last, Oded Maimon, Einat Minkov
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
14 years 1 months ago
Context Estimation and Learning Control through Latent Variable Extraction: From discrete to continuous contexts
— Recent advances in machine learning and adaptive motor control have enabled efficient techniques for online learning of stationary plant dynamics and it’s use for robust pre...
Georgios Petkos, Sethu Vijayakumar
INFOCOM
1998
IEEE
13 years 12 months ago
Design of Logical Topologies: A Linear Formulation for Wavelength Routed Optical Networks with No Wavelength Changers
We consider the problem of constructing logical topologies over a wavelength-routed optical network with no wavelength changers. We present a general linear formulation which consi...
Rajesh M. Krishnaswamy, Kumar N. Sivarajan
SECON
2010
IEEE
13 years 5 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
IPPS
2007
IEEE
14 years 1 months ago
Strategies for Replica Placement in Tree Networks
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity constraints. The client requests are known beforehand, while ...
Anne Benoit, Veronika Rehn, Yves Robert