Sciweavers

372 search results - page 62 / 75
» time 1996
Sort
View
138
Voted
COLT
2010
Springer
15 years 1 months ago
An Asymptotically Optimal Bandit Algorithm for Bounded Support Models
Multiarmed bandit problem is a typical example of a dilemma between exploration and exploitation in reinforcement learning. This problem is expressed as a model of a gambler playi...
Junya Honda, Akimichi Takemura
COLING
2010
14 years 10 months ago
A Multi-Domain Web-Based Algorithm for POS Tagging of Unknown Words
We present a web-based algorithm for the task of POS tagging of unknown words (words appearing only a small number of times in the training data of a supervised POS tagger). When ...
Shulamit Umansky-Pesin, Roi Reichart, Ari Rappopor...
CPM
1998
Springer
209views Combinatorics» more  CPM 1998»
15 years 7 months ago
A Fast Bit-Vector Algorithm for Approximate String Matching Based on Dynamic Programming
The approximate string matching problem is to find all locations at which a query of length m matches a substring of a text of length n with k-or-fewer differences. Simple and prac...
Gene Myers
SIGMOD
1996
ACM
143views Database» more  SIGMOD 1996»
15 years 7 months ago
Algorithms for Deferred View Maintenance
Materialized views and view maintenance are important for data warehouses, retailing, banking, and billing applications. We consider two related view maintenance problems: 1) how ...
Latha S. Colby, Timothy Griffin, Leonid Libkin, In...
SODA
1996
ACM
157views Algorithms» more  SODA 1996»
15 years 4 months ago
Routing and Admission Control in General Topology Networks with Poisson Arrivals
Emerging high speed networks will carry tra c for services such as video-on-demand and video teleconferencing that require resource reservation along the path on which the tra c i...
Anil Kamath, Omri Palmon, Serge A. Plotkin