Sciweavers

9719 search results - page 1911 / 1944
» Answer Set Optimization
Sort
View
CORR
2007
Springer
115views Education» more  CORR 2007»
13 years 10 months ago
Error Exponents of Erasure/List Decoding Revisited via Moments of Distance Enumerators
The analysis of random coding error exponents pertaining to erasure/list decoding, due to Forney, is revisited. Instead of using Jensen’s inequality as well as some other inequa...
Neri Merhav
CORR
2007
Springer
167views Education» more  CORR 2007»
13 years 10 months ago
Approximation Algorithms for Orienteering with Time Windows
Orienteering is the following optimization problem: given an edge-weighted graph (directed or undirected), two nodes s, t and a time limit T, find an s-t walk of total length at ...
Chandra Chekuri, Nitish Korula
ISF
2006
118views more  ISF 2006»
13 years 10 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
JACM
2006
93views more  JACM 2006»
13 years 10 months ago
Combining expert advice in reactive environments
"Experts algorithms" constitute a methodology for choosing actions repeatedly, when the rewards depend both on the choice of action and on the unknown current state of t...
Daniela Pucci de Farias, Nimrod Megiddo
JCP
2006
117views more  JCP 2006»
13 years 10 months ago
Empirical Analysis of Attribute-Aware Recommender System Algorithms Using Synthetic Data
As the amount of online shoppers grows rapidly, the need of recommender systems for e-commerce sites are demanding, especially when the number of users and products being offered o...
Karen H. L. Tso, Lars Schmidt-Thieme
« Prev « First page 1911 / 1944 Last » Next »