Sciweavers

2735 search results - page 455 / 547
» Comparing notions of randomness
Sort
View
PE
2010
Springer
170views Optimization» more  PE 2010»
13 years 9 months ago
Approximating passage time distributions in queueing models by Bayesian expansion
We introduce Bayesian Expansion (BE), an approximate numerical technique for passage time distribution analysis in queueing networks. BE uses a class of Bayesian networks to appro...
Giuliano Casale
PKDD
2010
Springer
129views Data Mining» more  PKDD 2010»
13 years 9 months ago
Smarter Sampling in Model-Based Bayesian Reinforcement Learning
Abstract. Bayesian reinforcement learning (RL) is aimed at making more efficient use of data samples, but typically uses significantly more computation. For discrete Markov Decis...
Pablo Samuel Castro, Doina Precup
PSD
2010
Springer
131views Database» more  PSD 2010»
13 years 9 months ago
Data Swapping for Protecting Census Tables
The pre-tabular statistical disclosure control (SDC) method of data swapping is the preferred method for protecting Census tabular data in some National Statistical Institutes, in...
Natalie Shlomo, Caroline Tudor, Paul Groom
PVLDB
2010
92views more  PVLDB 2010»
13 years 9 months ago
SSD Bufferpool Extensions for Database Systems
High-end solid state disks (SSDs) provide much faster access to data compared to conventional hard disk drives. We present a technique for using solid-state storage as a caching l...
Mustafa Canim, George A. Mihaila, Bishwaranjan Bha...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 9 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg