Sciweavers

2659 search results - page 100 / 532
» Do we mean the same
Sort
View
BNCOD
1998
84views Database» more  BNCOD 1998»
15 years 5 months ago
Considering Integrity Constraints During Federated Database Design
Correct transformations and integrations of schemata within the process of federated database design have to encompass existing local integrity constraints. Most of the proposed me...
Stefan Conrad, Ingo Schmitt, Can Türker
ANLP
1992
116views more  ANLP 1992»
15 years 5 months ago
Automatic Learning for Semantic Collocation
The real di culty in development of practical NLP systems comes from the fact that we do not have e ective means for gathering \knowledge". In this paper, we propose an algor...
Satoshi Sekine, Jeremy J. Carroll, Sophia Ananiado...
ML
2008
ACM
152views Machine Learning» more  ML 2008»
15 years 4 months ago
Learning near-optimal policies with Bellman-residual minimization based fitted policy iteration and a single sample path
Abstract. We consider batch reinforcement learning problems in continuous space, expected total discounted-reward Markovian Decision Problems. As opposed to previous theoretical wo...
András Antos, Csaba Szepesvári, R&ea...
PC
2006
96views Management» more  PC 2006»
15 years 4 months ago
Modeling Master/Worker applications for automatic performance tuning
Parallel application development is a very difficult task for non-expert programmers, and therefore support tools are needed for all phases of this kind of application development...
Eduardo César, Andreu Moreno, Joan Sorribes...
TKDE
2011
182views more  TKDE 2011»
14 years 11 months ago
Data Leakage Detection
—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an un...
Panagiotis Papadimitriou 0002, Hector Garcia-Molin...