Sciweavers

203 search results - page 14 / 41
» Second-Order Risk Constraints
Sort
View
SDM
2007
SIAM
131views Data Mining» more  SDM 2007»
13 years 8 months ago
Load Shedding in Classifying Multi-Source Streaming Data: A Bayes Risk Approach
In many applications, we monitor data obtained from multiple streaming sources for collective decision making. The task presents several challenges. First, data in sensor networks...
Yijian Bai, Haixun Wang, Carlo Zaniolo
DA
2010
141views more  DA 2010»
13 years 7 months ago
Optimal Static Hedging of Volumetric Risk in a Competitive Wholesale Electricity Market
In competitive wholesale electricity markets, regulated load serving entities (LSEs) and marketers with default service contracts have obligations to serve fluctuating load at pre...
Yumi Oum, Shmuel S. Oren
CIKM
2009
Springer
14 years 1 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
ICML
2007
IEEE
14 years 8 months ago
Focused crawling with scalable ordinal regression solvers
In this paper we propose a novel, scalable, clustering based Ordinal Regression formulation, which is an instance of a Second Order Cone Program (SOCP) with one Second Order Cone ...
Rashmin Babaria, J. Saketha Nath, S. Krishnan, K. ...
GLOBECOM
2007
IEEE
14 years 1 months ago
Non-Coherent Detection for Amplify-and-Forward Relay Systems in a Rayleigh Fading Environment
— We consider about a multiple relay system operating under amplify-and-forward (AF) protocol and non-coherent modulation and demodulation. When the relays are under long-term po...
Yonglan Zhu, Pooi Yuen Kam, Yan Xin