Sciweavers

1995 search results - page 21 / 399
» What's the Problem
Sort
View
104
Voted
CI
2002
92views more  CI 2002»
15 years 3 months ago
Model Selection in an Information Economy: Choosing What to Learn
As online markets for the exchange of goods and services become more common, the study of markets composed at least in part of autonomous agents has taken on increasing importance...
Christopher H. Brooks, Robert S. Gazzale, Rajarshi...
128
Voted
IMC
2010
ACM
15 years 1 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
167
Voted
CORR
2012
Springer
170views Education» more  CORR 2012»
13 years 11 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
105
Voted
IV
2005
IEEE
142views Visualization» more  IV 2005»
15 years 9 months ago
Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?
The field of information visualization offers little methodological guidance to practitioners who seek to design novel systems. Though many sources describe the foundations of the...
Brock Craft, Paul A. Cairns
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 8 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert