Now showing items 1-17 of 17

    • An Exploratory Study of Cell Growth and Division Data 

      Niu, Tong (2016)
      Understanding the mechanism behind cell-size control of bacteria such as E. coli has been an active research topic for decades. Until about 2010, most studies were limited to measurements at the cell population level. Recently ...
    • Approximately Optimal Mechanisms With Correlated Buyer Valuations 

      Albert, Michael Joseph (2013)
      Cremer and McLean 1985 shows that if buyers valuations are suciently correlated, there is a mechanism that allows the seller to extract the full surplus from the buyers. However, in practice, we do not see the Cremer-McLean ...
    • Efficient selection of disambiguating actions for stereo vision 

      Schaeffer, M; Parr, R (Proceedings of the 22nd Conference on Uncertainty in Artificial Intelligence, UAI 2006, 2006-12-01)
      In many domains that involve the use of sensors, such as robotics or sensor networks, there are opportunities to use some form of active sensing to disambiguate data from noisy or unreliable sensors. These disambiguating ...
    • Exploiting Common Structures Across Multiple Network Propagation Schemes 

      Chen, Xi (2018)
      PageRank is arguably the most popular graph-node ranking algorithm which has been used to analyze large networks. This paper presents how to utilize common structures across multiple damping schemes in PageRank algorithm ...
    • Improving IP-based geo-location through Internet Topology and Geospatial Datasets 

      Moses, Kyle Vincent (2013)
      Accurate IP geo-location is crucial to the effectiveness of a wide array of Internet-based services ranging from targeted advertising and website localization to content delivery, security logging and authentication. The ...
    • Interpretable Almost-Matching Exactly with Instrumental Variables 

      Liu, Yameng (2019)
      We aim to create the highest possible quality of treatment-control matches for categorical data in the potential outcomes framework. The method proposed in this work aims to match units on a weighted Hamming distance, taking ...
    • Non-parametric approximate linear programming for MDPs 

      Pazis, J; Parr, R (Proceedings of the National Conference on Artificial Intelligence, 2011-11-02)
      The Approximate Linear Programming (ALP) approach to value function approximation for MDPs is a parametric value function approximation method, in that it represents the value function as a linear combination of features ...
    • On Provable Algorithms for Determination of Continuous Protein Interdomain Motions from Residual Dipolar Couplings 

      Qi, Yang (2016)
      Dynamics of biomolecules over various spatial and time scales are essential for biological functions such as molecular recognition, catalysis and signaling. However, reconstruction of biomolecular dynamics from experimental ...
    • Predicting Application Performance in the Cloud 

      ZONG, XUANRAN (2011)
      Despite the exceptional prominence of the cloud computing, the customers arelack of direct sense to select the cloud that delivers the best performance,due to the performance heterogeneity of each cloud provider. Existing ...
    • Realtime Image Processing for Resource Constrained Devices 

      Streiffer, Christopher (2018)
      With the proliferation of embedded sensors within smartphone and Internet-of-Things devices, applications have programmatic access to more data processing than ever before. At the same time, advances in computer vision and ...
    • Student Paths in CS1: Case Studies of Initial Poor Performers 

      Kim, Ji Yeon (2019)
      With the high influx of computer science enrollment in universities in the last decade, there is increasing value and wide-reaching effects in improving pedagogy in the field. This improvement is especially useful in introductory ...
    • Studying Recommender Systems to Enhance Distributed Computing Schedulers 

      Demoulin, Henri Maxime (2016)
      Distributed Computing frameworks belong to a class of programming models that allow developers to launch workloads on large clusters of machines. Due to the dramatic increase in the volume of data gathered by ubiquitous ...
    • Supplemental Authentication via Internet Fingerprinting 

      Tate, Ryan (2011)
      Internet websites are a regular medium for exchanging sensitive information such as online banking. The security of this information is paramount. Today, one facet of this security - authenticating a website to its users ...
    • The Impact of Skill-based Training Across Different Levels of Autonomy for Drone Inspection Tasks 

      Kim, Minwoo (2018)
      Given their low operating costs and flight capabilities, Unmanned Aircraft Vehicles(UAVs), especially small size UAVs, have a wide range of applications, from civilian rescue missions to military surveillance. Easy control ...
    • The Revelation Principle for Mechanism Design with Signaling Costs 

      Kephart, Andrew (2017)
      The revelation principle is a key tool in mechanism design. It allows the designer to restrict attention to the class of truthful mechanisms, greatly facilitating analysis. This is also borne out in an algorithmic sense, ...
    • Transition Space Distance Learning 

      Nemecek, Mark William (2019)
      The notion of distance plays and important role in many reinforcement learning (RL) techniques. This role may be explicit, as in some non-parametric approaches, or it may be implicit in the architecture of the feature space. ...
    • Variable Damping Effect on Network Propagation 

      Qian, Yuchen (2018)
      In modern network analysis, the PageRank algorithm has been used as an indispens-able tool to determine the importance and relevance of the network nodes. Inspiteof extensive research conducted to accelerate the algorithm ...