Sciweavers

8701 search results - page 1689 / 1741
» Protecting information on the Web
Sort
View
TSP
2010
13 years 4 months ago
Distributed learning in multi-armed bandit with multiple players
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are distributed players competing for independent arms. Each arm, when played, offers i.i.d. reward a...
Keqin Liu, Qing Zhao
WWW
2011
ACM
13 years 4 months ago
Automatic construction of a context-aware sentiment lexicon: an optimization approach
The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people’s sentiments toward different topics. In most sentiment analy...
Yue Lu, Malú Castellanos, Umeshwar Dayal, C...
CVPR
2009
IEEE
14 years 4 months ago
Recognizing realistic actions from videos
In this paper, we present a systematic framework for recognizing realistic actions from videos “in the wild.” Such unconstrained videos are abundant in personal collections as...
Jingen Liu, Jiebo Luo, Mubarak Shah
ASPLOS
2011
ACM
13 years 1 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
BMCBI
2011
13 years 1 months ago
ENGINES: exploring single nucleotide variation in entire human genomes
Background: Next generation ultra-sequencing technologies are starting to produce extensive quantities of data from entire human genome or exome sequences, and therefore new softw...
Jorge Amigo, Antonio Salas, Christopher Phillips
« Prev « First page 1689 / 1741 Last » Next »