Results 101 to 110 of about 19,694 (357)

Survey and Sequence Strategies for Full‐3D Electrical Resistivity Tomography in Archaeological Sites: A Case Study on a Domus of the Roman Town of Augusta Bagiennorum (NW Italy)

open access: yesArchaeological Prospection, EarlyView.
ABSTRACT Preliminary geophysical investigations are a cost‐effective and efficient way to screen archaeological sites and locate buried structures. Ground‐penetrating radar (GPR) is one of the most widely used methods for archaeological prospection, but in some sites, it cannot be employed effectively due to the presence of clay or other electrically ...
Andrea Vergnano   +5 more
wiley   +1 more source

A law of the iterated logarithm for small counts in Karlin’s occupancy scheme

open access: yesModern Stochastics: Theory and Applications
In the Karlin infinite occupancy scheme, balls are thrown independently into an infinite array of boxes $1,2,\dots $ , with probability ${p_{k}}$ of hitting the box k.
Alexander Iksanov, Valeriya Kotelnikova
doaj   +1 more source

Data, not documents: Moving beyond theories of information‐seeking behavior to advance data discovery

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 4, Page 649-664, April 2025.
Abstract Many theories of human information behavior (HIB) assume that information objects are in text document format. This paper argues four important HIB theories are insufficient for describing users' search strategies for data because of assumptions about the attributes of objects that users seek.
Anthony J. Million   +3 more
wiley   +1 more source

Asymptotics for the Moment Convergence of -Statistics in LIL

open access: yesJournal of Inequalities and Applications, 2010
Let be a -statistic based on a symmetric kernel and i.i.d. samples . In this paper, the exact moment convergence rates in the law of the iterated logarithm and the law of the logarithm of are obtained, which extend previous results concerning ...
Fu Ke-Ang
doaj  

Laws of the Iterated Logarithm for Censored Data

open access: yesThe Annals of Probability, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Giné, Evarist, Guillou, Armelle
openaire   +3 more sources

“Basic human things”: Investigating vehicle residents' continually fractured (information) landscapes

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract This ethnographic study explores vehicle residents' information practices in the United States (US). Vehicle residents are people whose primary means of housing is a vehicle. This work builds on previous research encompassing transitions and fractured (information) landscapes. Using fractured information landscapes as the theoretical framework,
Kaitlin E. Montague
wiley   +1 more source

Risk‐aware safe reinforcement learning for control of stochastic linear systems

open access: yesAsian Journal of Control, EarlyView.
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili   +2 more
wiley   +1 more source

Regional Shopping Objectives in British Grocery Retail Transactions Using Segmented Topic Models

open access: yesApplied Stochastic Models in Business and Industry, EarlyView.
ABSTRACT Understanding the customer behaviours behind transactional data has high commercial value in the grocery retail industry. Customers generate millions of transactions every day, choosing and buying products to satisfy specific shopping needs.
Mariflor Vega Carrasco   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy