Sciweavers

1888 search results - page 319 / 378
» Proof theory and computational analysis
Sort
View
SDM
2009
SIAM
152views Data Mining» more  SDM 2009»
14 years 7 months ago
Non-negative Matrix Factorization, Convexity and Isometry.
In this paper we explore avenues for improving the reliability of dimensionality reduction methods such as Non-Negative Matrix Factorization (NMF) as interpretive exploratory data...
Nikolaos Vasiloglou, Alexander G. Gray, David V. A...
HRI
2009
ACM
14 years 4 months ago
An information pipeline model of human-robot interaction
This paper investigates the potential usefulness of viewing the system of human, robot, and environment as an “information pipeline” from environment to user and back again. I...
Kevin Gold
ECSQARU
2009
Springer
14 years 4 months ago
Extracting the Core of a Persuasion Dialog to Evaluate Its Quality
: A persuasion dialog is a dialog in which agents exchange arguments on a subject. In this kind of dialog, the agents disagree about the status of the subject and each one tries to...
Leila Amgoud, Florence Dupin de Saint-Cyr
SIGCOMM
2009
ACM
14 years 4 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
SIGMETRICS
2009
ACM
140views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Maximum likelihood estimation of the flow size distribution tail index from sampled packet data
In the context of network traffic analysis, we address the problem of estimating the tail index of flow (or more generally of any group) size distribution from the observation of...
Patrick Loiseau, Paulo Gonçalves, Sté...