Sciweavers

1640 search results - page 298 / 328
» Deriving Private Information from Randomized Data
Sort
View
ICML
2010
IEEE
13 years 9 months ago
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design
Many applications require optimizing an unknown, noisy function that is expensive to evaluate. We formalize this task as a multiarmed bandit problem, where the payoff function is ...
Niranjan Srinivas, Andreas Krause, Sham Kakade, Ma...
CGF
2010
124views more  CGF 2010»
13 years 8 months ago
DTI in Context: Illustrating Brain Fiber Tracts In Situ
We present an interactive illustrative visualization method inspired by traditional pen-and-ink illustration styles. Specifically, we explore how to provide context around DTI fib...
Pjotr Svetachov, Maarten H. Everts, Tobias Isenber...
CORR
2008
Springer
88views Education» more  CORR 2008»
13 years 8 months ago
Coding Strategies for Noise-free Relay Cascades with Half-Duplex Constraint
Abstract--Two types of noise-free relay cascades are investigated. Networks where a source communicates with a distant receiver via a cascade of half-duplex constrained relays, and...
Tobias Lutz, Christoph Hausl, Ralf Koetter
TASLP
2008
158views more  TASLP 2008»
13 years 8 months ago
Score-Independent Audio Features for Description of Music Expression
Abstract--During a music performance, the musician adds expressiveness to the musical message by changing timing, dynamics, and timbre of the musical events to communicate an expre...
Luca Mion, Giovanni De Poli
ISJ
2002
84views more  ISJ 2002»
13 years 8 months ago
Transaction attributes and software outsourcing success: an empirical investigation of transaction cost theory
In recent years, an increasing amount of attention has been paid to information systems (IS) outsourcing by practitioners as well as academics. However, our understanding of the fa...
Eric T. G. Wang