Sciweavers

95 search results - page 17 / 19
» Filling and slotting: analysis and algorithms
Sort
View
COLT
2008
Springer
13 years 9 months ago
Adapting to a Changing Environment: the Brownian Restless Bandits
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
Aleksandrs Slivkins, Eli Upfal
INFOCOM
2010
IEEE
13 years 6 months ago
Neighbor Discovery with Reception Status Feedback to Transmitters
—Neighbor discovery is essential for the process of self-organization of a wireless network, where almost all routing and medium access protocols need knowledge of one-hop neighb...
Ramin Khalili, Dennis Goeckel, Donald F. Towsley, ...
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 8 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
BMCBI
2007
246views more  BMCBI 2007»
13 years 7 months ago
TomoJ: tomography software for three-dimensional reconstruction in transmission electron microscopy
Background: Transmission electron tomography is an increasingly common three-dimensional electron microscopy approach that can provide new insights into the structure of subcellul...
Cédric Messaoudi, Thomas Boudier, Carlos Os...
BMCBI
2006
155views more  BMCBI 2006»
13 years 7 months ago
AffyMiner: mining differentially expressed genes and biological knowledge in GeneChip microarray data
Background: DNA microarrays are a powerful tool for monitoring the expression of tens of thousands of genes simultaneously. With the advance of microarray technology, the challeng...
Guoqing Lu, The V. Nguyen, Yuannan Xia, Michael Fr...