Results 1 to 10 of about 2,492,130 (223)
Multi-Armed Bandits With Correlated Arms [PDF]
We consider a multi-armed bandit framework where the rewards obtained by pulling different arms are correlated. We develop a unified approach to leverage these reward correlations and present fundamental generalizations of classic bandit algorithms to the correlated setting.
Samarth Gupta+3 more
openaire +4 more sources
Less is More: Exploiting the Standard Compiler Optimization Levels for Better Performance and Energy Consumption [PDF]
This paper presents the interesting observation that by performing fewer of the optimizations available in a standard compiler optimization level such as -O2, while preserving their original ordering, significant savings can be achieved in both execution
ARM.+10 more
core +3 more sources
“Arm in arm with righteousness” [PDF]
My title comes from Joseph Conrad who, in his 1913 novel Chance, wrote: You know the power of words. We pass through periods dominated by this or that word - it may be development, or it may be competition, or education, or purity or efficiency or even sanctity. It is the word of the time.
openaire +3 more sources
ABSTRACT We use astrometry and broad-band photometry from Data Release 2 of the ESA’s Gaia mission to map out low surface-brightness features in the stellar density distribution around the Large and Small Magellanic Clouds. The LMC appears to have grown two thin and long stellar streams in its Northern and Southern regions, highly ...
Vasily A Belokurov, Denis Erkal
openaire +4 more sources
The aim of this paper is to investigate the determinants of international arms transfers in a gravity model framework. By distinguishing between the decision to export arms (extensive margin) and the value of the arms exported (intensive margin), while also considering its interdependence, is what differentiates this paper from previous research.
Inmaculada Martínez-Zarzoso+1 more
openaire +4 more sources
Multi-armed bandits with dependent arms
We study a variant of the classical multi-armed bandit problem (MABP) which we call as Multi-Armed Bandits with dependent arms. More specifically, multiple arms are grouped together to form a cluster, and the reward distributions of arms belonging to the same cluster are known functions of an unknown parameter that is a characteristic of the cluster ...
Rahul Singh+3 more
openaire +2 more sources
Scoping analytical usability evaluation methods: A case study [PDF]
Analytical usability evaluation methods (UEMs) can complement empirical evaluation of systems: for example, they can often be used earlier in design and can provide accounts of why users might experience difficulties, as well as what those difficulties ...
Blandford, AE+3 more
core +2 more sources
Switch to maraviroc with darunavir/r, both QD, in patients with suppressed HIV-1 was well tolerated but virologically inferior to standard antiretroviral therapy: 48-Week results of a randomized trial [PDF]
Objectives Primary study outcome was absence of treatment failure (virological failure, VF, or treatment interruption) per protocol at week 48.
Antinori, Andrea+29 more
core +5 more sources
User evaluation of an interactive learning framework for single-arm and dual-arm robots [PDF]
The final publication is available at link.springer.comSocial robots are expected to adapt to their users and, like their human counterparts, learn from the interaction.
A Colomé+11 more
core +1 more source
The authors present a magnetic resonance image showing a soft tissue mass misdiagnosed as sarcoma.
Pederiva, Federica+4 more
openaire +4 more sources