Sciweavers

3236 search results - page 517 / 648
» Designing better phages
Sort
View
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 9 months ago
Multi-Armed Bandits in Metric Spaces
In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of n trials so as to maximize the total payoff of the chosen strategies. While ...
Robert Kleinberg, Aleksandrs Slivkins, Eli Upfal
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 9 months ago
SOSEMANUK: a fast software-oriented stream cipher
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 ...
Côme Berbain, Olivier Billet, Anne Canteaut,...
ADHOC
2006
115views more  ADHOC 2006»
13 years 9 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson
AIEDU
2006
73views more  AIEDU 2006»
13 years 9 months ago
Using Knowledge Tracing in a Noisy Environment to Measure Student Reading Proficiencies
Constructing a student model for language tutors is a challenging task. This paper describes using knowledge tracing to construct a student model of reading proficiency and validat...
Joseph E. Beck, June Sison
IEE
2008
120views more  IEE 2008»
13 years 9 months ago
Reducing the use of nullable types through non-null by default and monotonic non-null
With Java 5 annotations, we note a marked increase in tools that can statically detect potential null dereferences. To be effective such tools require that developers annotate decl...
Patrice Chalin, Perry R. James, Frédé...