Sciweavers

107 search results - page 13 / 22
» On the Optimal Selection of k in the k-Anonymity Problem
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 4 months ago
The Non-Bayesian Restless Multi-Armed Bandit: a Case of Near-Logarithmic Regret
In the classic Bayesian restless multi-armed bandit (RMAB) problem, there are N arms, with rewards on all arms evolving at each time as Markov chains with known parameters. A play...
Wenhan Dai, Yi Gai, Bhaskar Krishnamachari, Qing Z...
JSAC
2008
106views more  JSAC 2008»
13 years 7 months ago
Enhanced multiuser random beamforming: dealing with the not so large number of users case
We consider the downlink of a wireless system with an M-antenna base station and K single-antenna users. A limited feedback-based scheduling and precoding scenario is considered th...
Marios Kountouris, David Gesbert, Thomas Sälz...
STOC
2000
ACM
156views Algorithms» more  STOC 2000»
14 years 4 days ago
Near optimal multiple alignment within a band in polynomial time
Multiple sequence alignment is a fundamental problem in computational biology. Because of its notorious difficulties, aligning sequences within a constant band (c-diagonal) is a ...
Ming Li, Bin Ma, Lusheng Wang
ICCV
2009
IEEE
15 years 23 days ago
A Theory of Active Object Localization
We present some theoretical results related to the problem of actively searching for a target in a 3D environment, under the constraint of a maximum search time. We define the o...
Alexander Andreopoulos, John K. Tsotsos
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 7 months ago
The Projected GSURE for Automatic Parameter Tuning in Iterative Shrinkage Methods
Linear inverse problems are very common in signal and image processing. Many algorithms that aim at solving such problems include unknown parameters that need tuning. In this work...
Raja Giryes, Michael Elad, Yonina C. Eldar