Results 161 to 170 of about 1,554,751 (204)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Multiplier Bootstrap Approach to Designing Robust Algorithms for Contextual Bandits
IEEE Transactions on Neural Networks and Learning Systems, 2022Upper confidence bound (UCB)-based contextual bandit algorithms require one to know the tail property of the reward distribution. Unfortunately, such tail property is usually unknown or difficult to specify in real-world applications.
Hong Xie, Qiaoqiao Tang, Qingsheng Zhu
semanticscholar +1 more source
IEEE Geoscience and Remote Sensing Letters, 2023
Sparse and low-rank modeling has shown the powerful describing abilities to express small targets; however, low-rank model exists the problem of insufficient rank approximation deviation ability and excessive shrinkage, which will lead to inaccurate ...
Guofeng Zhang, A. Hamdulla, Hongbing Ma
semanticscholar +1 more source
Sparse and low-rank modeling has shown the powerful describing abilities to express small targets; however, low-rank model exists the problem of insufficient rank approximation deviation ability and excessive shrinkage, which will lead to inaccurate ...
Guofeng Zhang, A. Hamdulla, Hongbing Ma
semanticscholar +1 more source
European Journal of Mass Spectrometry, 2012
In this work, a method devised for the selective isolation of multiply-charged peptide applied to a complex protein mixture was evaluated for the first time using a mass spectrometer with low resolution (LTQ). In this procedure, all primary amino groups of tryptic peptides derived from human liver tissue interstitial fluid (TIF) are blocked ...
Gabriel Padrón+10 more
openaire +3 more sources
In this work, a method devised for the selective isolation of multiply-charged peptide applied to a complex protein mixture was evaluated for the first time using a mass spectrometer with low resolution (LTQ). In this procedure, all primary amino groups of tryptic peptides derived from human liver tissue interstitial fluid (TIF) are blocked ...
Gabriel Padrón+10 more
openaire +3 more sources
Neural Information Processing Systems
In this paper, we obtain the Berry-Esseen bound for multivariate normal approximation for the Polyak-Ruppert averaged iterates of the linear stochastic approximation (LSA) algorithm with decreasing step size.
S. Samsonov+4 more
semanticscholar +1 more source
In this paper, we obtain the Berry-Esseen bound for multivariate normal approximation for the Polyak-Ruppert averaged iterates of the linear stochastic approximation (LSA) algorithm with decreasing step size.
S. Samsonov+4 more
semanticscholar +1 more source
2024 Ninth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
A Novel Dadda multiplier called a Kogge Stone Adder is the object of this study's comparison of power consumption and delay. that employs 4:2 compressors, and a suggested Brent Kung adder in order to determine the efficiency of very large-scale ...
G. Rohith+2 more
semanticscholar +1 more source
A Novel Dadda multiplier called a Kogge Stone Adder is the object of this study's comparison of power consumption and delay. that employs 4:2 compressors, and a suggested Brent Kung adder in order to determine the efficiency of very large-scale ...
G. Rohith+2 more
semanticscholar +1 more source
Drug and Alcohol Review, 2006
We consider the question of what method should be recommended to estimate the prevalence of injecting drug use (IDU); and compare multiplier and capture-recapture (CRC) methods of estimating prevalence of injecting drug use (IDU).
M. Hickman+7 more
semanticscholar +1 more source
We consider the question of what method should be recommended to estimate the prevalence of injecting drug use (IDU); and compare multiplier and capture-recapture (CRC) methods of estimating prevalence of injecting drug use (IDU).
M. Hickman+7 more
semanticscholar +1 more source
Period Analysis and Multiplier Theory
, 2010Significant periods: transaction periods, 2; income periods, 3; plan adjustment periods, 5; equilibrium adjustment periods, 6. — The relevant income period, 7.— The length of the adjustment period, 11.
F. Machlup
semanticscholar +1 more source
Robust Confidence Sets in the Presence of Weak Instruments
, 2005This paper considers instrumental variable regression with a single endogenous variable and the potential presence of weak instruments. I construct confidence sets for the coefficient on the single endogenous regressor by inverting tests robust to weak ...
Anna Mikusheva
semanticscholar +1 more source
A two ellipsoid overlap test for real time failure detection and isolation by confidence regions
IEEE Conference on Decision and Control, 1974Real time failure detection for systems having a linear stochastic dynamical truth model is posed in terms of two confidence region sheaths. One confidence region sheath is about the expected no failure trajectory, the other is about the Kalman estimate.
T. Kerr
semanticscholar +1 more source