Sciweavers

109 search results - page 17 / 22
» Algorithm Selection as a Bandit Problem with Unbounded Losse...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Network Performance Anomaly Detection and Localization
Abstract—Detecting the occurrence and location of performance anomalies (e.g., high jitter or loss events) is critical to ensuring the effective operation of network infrastructu...
Paul Barford, Nick G. Duffield, Amos Ron, Joel Som...
KDD
2000
ACM
140views Data Mining» more  KDD 2000»
13 years 11 months ago
Effective Retrieval of Audio Information from Annotated Text Using Ontologies
To improve the accuracy in terms of precision and recall of an audio information retrieval system we have created a domainspecific ontology (a collection of key concepts and their...
Latifur Khan, Dennis McLeod
PR
2008
144views more  PR 2008»
13 years 7 months ago
Regularized query classification using search click information
Hundreds of millions of users each day submit queries to the Web search engine. The user queries are typically very short which makes query understanding a challenging problem. In...
Xiaofei He, Pradhuman Jhala
TEC
2008
104views more  TEC 2008»
13 years 7 months ago
Coevolution of Fitness Predictors
Abstract--We present an algorithm that coevolves fitness predictors, optimized for the solution population, which reduce fitness evaluation cost and frequency, while maintaining ev...
Michael D. Schmidt, Hod Lipson
MOBIHOC
2007
ACM
14 years 7 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang