Sciweavers

12753 search results - page 2326 / 2551
» is 2002
Sort
View
ACL
2010
15 years 2 months ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos
COLT
2010
Springer
15 years 2 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
15 years 1 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
CORR
2011
Springer
202views Education» more  CORR 2011»
14 years 11 months ago
Online Least Squares Estimation with Self-Normalized Processes: An Application to Bandit Problems
The analysis of online least squares estimation is at the heart of many stochastic sequential decision-making problems. We employ tools from the self-normalized processes to provi...
Yasin Abbasi-Yadkori, Dávid Pál, Csa...
CORR
2011
Springer
170views Education» more  CORR 2011»
14 years 11 months ago
Ecosystem Viable Yields
The World Summit on Sustainable Development (Johannesburg, 2002) encouraged the application of the ecosystem approach by 2010. However, at the same Summit, the signatory States un...
Michel De Lara, Eladio Ocaña Anaya, Ricardo...
« Prev « First page 2326 / 2551 Last » Next »