Sciweavers

1668 search results - page 58 / 334
» Two Philosophical Applications of Algorithmic Information Th...
Sort
View
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 6 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
SODA
2003
ACM
142views Algorithms» more  SODA 2003»
15 years 6 months ago
The similarity metric
—A new class of distances appropriate for measuring similarity relations between sequences, say one type of similarity per distance, is studied. We propose a new “normalized in...
Ming Li, Xin Chen, Xin Li, Bin Ma, Paul M. B. Vit&...
139
Voted
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
15 years 8 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 7 months ago
eTrust: understanding trust evolution in an online world
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
140
Voted
JMLR
2012
13 years 7 months ago
PAC-Bayes-Bernstein Inequality for Martingales and its Application to Multiarmed Bandits
We develop a new tool for data-dependent analysis of the exploration-exploitation trade-off in learning under limited feedback. Our tool is based on two main ingredients. The fi...
Yevgeny Seldin, Nicolò Cesa-Bianchi, Peter ...