Sciweavers

410 search results - page 45 / 82
» Max and min limiters
Sort
View
CORR
2008
Springer
136views Education» more  CORR 2008»
13 years 7 months ago
Multi-Armed Bandits in Metric Spaces
In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of n trials so as to maximize the total payoff of the chosen strategies. While ...
Robert Kleinberg, Aleksandrs Slivkins, Eli Upfal
FSS
2008
94views more  FSS 2008»
13 years 7 months ago
Lattices of convex normal functions
The algebra of truth values of type-2 fuzzy sets is the set of all functions from the unit interval into itself, with operations de ned in terms of certain convolutions of these f...
John Harding, Carol L. Walker, Elbert A. Walker
CORR
2006
Springer
87views Education» more  CORR 2006»
13 years 7 months ago
Capacity of a Class of Deterministic Relay Channels
Abstract-- The capacity of a class of deterministic relay channels with the transmitter input X, the receiver output Y , the relay output Y1 = f(X, Y ), and a separate communicatio...
Thomas M. Cover, Young-Han Kim
CORR
2006
Springer
128views Education» more  CORR 2006»
13 years 7 months ago
Minimum Cost Homomorphisms to Semicomplete Bipartite Digraphs
For digraphs D and H, a mapping f : V (D)V (H) is a homomorphism of D to H if uv A(D) implies f(u)f(v) A(H). If, moreover, each vertex u V (D) is associated with costs ci(u), i...
Gregory Gutin, Arash Rafiey, Anders Yeo
JCP
2008
142views more  JCP 2008»
13 years 7 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun