Sciweavers

CORR
2012
Springer
195views Education» more  CORR 2012»
12 years 7 months ago
Ranking hubs and authorities using matrix functions
The notions of subgraph centrality and communicability, based on the exponential of the adjacency matrix of the underlying graph, have been effectively used in the analysis of und...
Michele Benzi, Ernesto Estrada, Christine Klymko
CORR
2012
Springer
192views Education» more  CORR 2012»
12 years 7 months ago
Rapid Application Development Using Software Factories
: Software development is still based on manufactory production, and most of the programming code is still hand-crafted. Software development is very far away from the ultimate goa...
Toni Stojanovski, Tomislav Dzekov
CORR
2012
Springer
187views Education» more  CORR 2012»
12 years 7 months ago
Sequential Inference for Latent Force Models
Latent force models (LFMs) are hybrid models combining mechanistic principles with non-parametric components. In this article, we shall show how LFMs can be equivalently formulate...
Jouni Hartikainen, Simo Särkkä
CORR
2012
Springer
212views Education» more  CORR 2012»
12 years 7 months ago
A Bi-Directional Refinement Algorithm for the Calculus of (Co)Inductive Constructions
The paper describes the refinement algorithm for the Calculus of (Co)Inductive Constructions (CIC) implemented in the interactive theorem prover Matita. The refinement algorithm ...
Andrea Asperti, Wilmer Ricciotti, Claudio Sacerdot...
CORR
2012
Springer
215views Education» more  CORR 2012»
12 years 7 months ago
Du TAL au TIL
position paper. Historically two types of NLP have been investigated: fully automated processing of language by machines (NLP) and autonomous processing of natural language by peop...
Michael Zock, Guy Lapalme
CORR
2012
Springer
218views Education» more  CORR 2012»
12 years 7 months ago
On the Hardness of Welfare Maximization in Combinatorial Auctions with Submodular Valuations
We present a new type of monotone submodular functions: multi-peak submodular functions. Roughly speaking, given a family of sets F, we construct a monotone submodular function f ...
Shahar Dobzinski, Jan Vondrák
CORR
2012
Springer
216views Education» more  CORR 2012»
12 years 7 months ago
Fractional Moments on Bandit Problems
Reinforcement learning addresses the dilemma between exploration to find profitable actions and exploitation to act according to the best observations already made. Bandit proble...
Ananda Narayanan B., Balaraman Ravindran
CORR
2012
Springer
272views Education» more  CORR 2012»
12 years 7 months ago
Fast and Exact Top-k Search for Random Walk with Restart
Graphs are fundamental data structures and have been employed for centuries to model real-world systems and phenomena. Random walk with restart (RWR) provides a good proximity sco...
Yasuhiro Fujiwara, Makoto Nakatsuji, Makoto Onizuk...
CORR
2012
Springer
250views Education» more  CORR 2012»
12 years 7 months ago
Mining Attribute-structure Correlated Patterns in Large Attributed Graphs
In this work, we study the correlation between attribute sets and the occurrence of dense subgraphs in large attributed graphs, a task we call structural correlation pattern minin...
Arlei Silva, Wagner Meira Jr., Mohammed J. Zaki
CORR
2012
Springer
193views Education» more  CORR 2012»
12 years 7 months ago
A Unifying Framework for Linearly Solvable Control
Recent work has led to the development of an elegant theory of Linearly Solvable Markov Decision Processes (LMDPs) and related Path-Integral Control Problems. Traditionally, LMDPs...
Krishnamurthy Dvijotham, Emanuel Todorov