Results 161 to 170 of about 1,554,751 (204)

A Multiplier Bootstrap Approach to Designing Robust Algorithms for Contextual Bandits

IEEE Transactions on Neural Networks and Learning Systems, 2022
Upper confidence bound (UCB)-based contextual bandit algorithms require one to know the tail property of the reward distribution. Unfortunately, such tail property is usually unknown or difficult to specify in real-world applications.
Hong Xie, Qiaoqiao Tang, Qingsheng Zhu
semanticscholar   +1 more source

Infrared Small Target Detection With Patch Tensor Collaborative Sparse and Total Variation Constraint

IEEE Geoscience and Remote Sensing Letters, 2023
Sparse and low-rank modeling has shown the powerful describing abilities to express small targets; however, low-rank model exists the problem of insufficient rank approximation deviation ability and excessive shrinkage, which will lead to inaccurate ...
Guofeng Zhang, A. Hamdulla, Hongbing Ma
semanticscholar   +1 more source

Selective Isolation of Multiply Charged Peptides: A Confident Strategy for Protein Identification Using a Linear Trap Quadrupole Mass Spectrometer

European Journal of Mass Spectrometry, 2012
In this work, a method devised for the selective isolation of multiply-charged peptide applied to a complex protein mixture was evaluated for the first time using a mass spectrometer with low resolution (LTQ). In this procedure, all primary amino groups of tryptic peptides derived from human liver tissue interstitial fluid (TIF) are blocked ...
Gabriel Padrón   +10 more
openaire   +3 more sources

Gaussian Approximation and Multiplier Bootstrap for Polyak-Ruppert Averaged Linear Stochastic Approximation with Applications to TD Learning

Neural Information Processing Systems
In this paper, we obtain the Berry-Esseen bound for multivariate normal approximation for the Polyak-Ruppert averaged iterates of the linear stochastic approximation (LSA) algorithm with decreasing step size.
S. Samsonov   +4 more
semanticscholar   +1 more source

Implementation of 8-bit Dadda Multiplier by Using 4:2 Compressors and Brentkung Adder for Reducing Propagation Delay in Comparison with Kogge Stone Adder

2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
A Novel Dadda multiplier called a Kogge Stone Adder is the object of this study's comparison of power consumption and delay. that employs 4:2 compressors, and a suggested Brent Kung adder in order to determine the efficiency of very large-scale ...
G. Rohith   +2 more
semanticscholar   +1 more source

Estimating prevalence of injecting drug use: a comparison of multiplier and capture-recapture methods in cities in England and Russia.

Drug and Alcohol Review, 2006
We consider the question of what method should be recommended to estimate the prevalence of injecting drug use (IDU); and compare multiplier and capture-recapture (CRC) methods of estimating prevalence of injecting drug use (IDU).
M. Hickman   +7 more
semanticscholar   +1 more source

Period Analysis and Multiplier Theory

, 2010
Significant periods: transaction periods, 2; income periods, 3; plan adjustment periods, 5; equilibrium adjustment periods, 6. — The relevant income period, 7.— The length of the adjustment period, 11.
F. Machlup
semanticscholar   +1 more source

Robust Confidence Sets in the Presence of Weak Instruments

, 2005
This paper considers instrumental variable regression with a single endogenous variable and the potential presence of weak instruments. I construct confidence sets for the coefficient on the single endogenous regressor by inverting tests robust to weak ...
Anna Mikusheva
semanticscholar   +1 more source

A two ellipsoid overlap test for real time failure detection and isolation by confidence regions

IEEE Conference on Decision and Control, 1974
Real time failure detection for systems having a linear stochastic dynamical truth model is posed in terms of two confidence region sheaths. One confidence region sheath is about the expected no failure trajectory, the other is about the Kalman estimate.
T. Kerr
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy