Sciweavers

CORR
2012
Springer
281views Education» more  CORR 2012»
12 years 8 months ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
CORR
2012
Springer
203views Education» more  CORR 2012»
12 years 8 months ago
Constant Factor Lasserre Integrality Gaps for Graph Partitioning Problems
Venkatesan Guruswami, Ali Kemal Sinop, Yuan Zhou
CORR
2012
Springer
178views Education» more  CORR 2012»
12 years 8 months ago
Q- and A-learning Methods for Estimating Optimal Dynamic Treatment Regimes
Phillip J. Schulte, Anastasios A. Tsiatis, Eric B....
CORR
2012
Springer
198views Education» more  CORR 2012»
12 years 8 months ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya
CORR
2012
Springer
204views Education» more  CORR 2012»
12 years 8 months ago
A Framework for Optimizing Paper Matching
At the heart of many scientific conferences is the problem of matching submitted papers to suitable reviewers. Arriving at a good assignment is a major and important challenge fo...
Laurent Charlin, Richard S. Zemel, Craig Boutilier
CORR
2012
Springer
185views Education» more  CORR 2012»
12 years 8 months ago
Adjustment Criteria in Causal Diagrams: An Algorithmic Perspective
Identifying and controlling bias is a key problem in empirical sciences. Causal diagram theory provides graphical criteria for deciding whether and how causal effects can be iden...
Johannes Textor, Maciej Liskiewicz
CORR
2012
Springer
229views Education» more  CORR 2012»
12 years 8 months ago
Cops and Invisible Robbers: the Cost of Drunkenness
We examine a version of the Cops and Robber (CR) game in which the robber is invisible, i.e., the cops do not know his location until they capture him. Apparently this game (CiR) h...
Athanasios Kehagias, Dieter Mitsche, Pawel Pralat
CORR
2012
Springer
205views Education» more  CORR 2012»
12 years 8 months ago
Pricing Data: A Look at Past Proposals, Current Plans, and Future Trends
Traditionally, network operators have only used simple flat-rate unlimited data plans to vie for customers. But today, with the popularity of mobile devices and exponential growt...
Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chia...
CORR
2012
Springer
167views Education» more  CORR 2012»
12 years 8 months ago
Multidimensional counting grids: Inferring word order from disordered bags of words
Models of bags of words typically assume topic mixing so that the words in a single bag come from a limited number of topics. We show here that many sets of bag of words exhibit a...
Nebojsa Jojic, Alessandro Perina
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 8 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...