Sciweavers

JMLR
2012
12 years 2 months ago
PAC-Bayes-Bernstein Inequality for Martingales and its Application to Multiarmed Bandits
We develop a new tool for data-dependent analysis of the exploration-exploitation trade-off in learning under limited feedback. Our tool is based on two main ingredients. The fi...
Yevgeny Seldin, Nicolò Cesa-Bianchi, Peter ...
JMLR
2012
12 years 2 months ago
Primal-Dual methods for sparse constrained matrix completion
We develop scalable algorithms for regular and non-negative matrix completion. In particular, we base the methods on trace-norm regularization that induces a low rank predicted ma...
Yu Xin, Tommi Jaakkola
JMLR
2012
12 years 2 months ago
On Bisubmodular Maximization
Bisubmodularity extends the concept of submodularity to set functions with two arguments. We show how bisubmodular maximization leads to richer value-of-information problems, usin...
Ajit Singh, Andrew Guillory, Jeff Bilmes
TODS
2012
12 years 2 months ago
Attribute and object selection queries on objects with probabilistic attributes
Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad M...
TODS
2012
12 years 2 months ago
Exploiting Web querying for Web people search
Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad M...
TODS
2012
12 years 2 months ago
A survey of B-tree logging and recovery techniques
B-trees have been ubiquitous in database management systems for several decades, and they serve in many other storage systems as well. Their basic structure and their basic operat...
Goetz Graefe
TOIT
2012
12 years 2 months ago
Minersoft: Software retrieval in grid and cloud computing infrastructures
Marios D. Dikaiakos, Asterios Katsifodimos, George...
TOCS
2012
12 years 2 months ago
A File Is Not a File: Understanding the I/O Behavior of Apple Desktop Applications
We analyze the I/O behavior of iBench, a new collection of productivity and multimedia application workloads. Our analysis reveals a number of differences between iBench and typic...
Tyler Harter, Chris Dragga, Michael Vaughn, Andrea...