Learning and Incentives in User-Generated Content
... User-generated content, such as reviews on sites like Yelp and Amazon, answers on online Q&A forums like Y! Answers, Quora or StackOverflow, comments on news stories or blogs, and user-created videos on YouTube or articles, for example, on Associated Content, are now ubiquitous on the web. This user ...
... User-generated content, such as reviews on sites like Yelp and Amazon, answers on online Q&A forums like Y! Answers, Quora or StackOverflow, comments on news stories or blogs, and user-created videos on YouTube or articles, for example, on Associated Content, are now ubiquitous on the web. This user ...
Survival probabilities of weighted random walks
... In the Gaussian case, we state upper and lower bounds on the rate of decay in Theorem 2.7 and characterize λβ as an eigenvalue of a certain integral operator in Proposition 2.12. Unfortunately, an explicit computation of λβ does not seem to be possible easily. 1.3. Related work. Let us briefly summa ...
... In the Gaussian case, we state upper and lower bounds on the rate of decay in Theorem 2.7 and characterize λβ as an eigenvalue of a certain integral operator in Proposition 2.12. Unfortunately, an explicit computation of λβ does not seem to be possible easily. 1.3. Related work. Let us briefly summa ...
Stochastic Processes
... variables in this section we recall the basic vocabulary and results of probability theory, probability and stochastic processes with applications - preface these notes grew from an introduction to probability theory taught during the rst and second term of 1994 at caltech there was a mixed audience ...
... variables in this section we recall the basic vocabulary and results of probability theory, probability and stochastic processes with applications - preface these notes grew from an introduction to probability theory taught during the rst and second term of 1994 at caltech there was a mixed audience ...
Efficient Solution Concepts and Their Relations in Stochastic
... involves always transforming the problem into a deterministic one, which is called the equivalent deterministic problem. This transformation is carried out by using some statistical characteristic of the random variables involved in the problem (expected value, variance, etc.). In the literature, th ...
... involves always transforming the problem into a deterministic one, which is called the equivalent deterministic problem. This transformation is carried out by using some statistical characteristic of the random variables involved in the problem (expected value, variance, etc.). In the literature, th ...
Journal of Neuroscience Methods Estimation of neuronal firing rates
... improved results, however, outcomes are highly dependent upon the skills of the person performing the analysis (Israel and Burchiel, 2004). If the shape of the action potential (AP) was reliably known, it would contain valuable information. However, the APs recorded in vivo are often contaminated by ...
... improved results, however, outcomes are highly dependent upon the skills of the person performing the analysis (Israel and Burchiel, 2004). If the shape of the action potential (AP) was reliably known, it would contain valuable information. However, the APs recorded in vivo are often contaminated by ...
INTERPRETING DNA EVIDENCE
... the book An Introduction to Forensic DNA Analysis by Inman and Rudin for those without this knowledge. Writing the book has been both a joy and a challenge. We have enjoyed laying out the foundations of a fascinating field, and we have been gratified by the response to early drafts from participants ...
... the book An Introduction to Forensic DNA Analysis by Inman and Rudin for those without this knowledge. Writing the book has been both a joy and a challenge. We have enjoyed laying out the foundations of a fascinating field, and we have been gratified by the response to early drafts from participants ...
Learning from satisfying assignments
... such as monotone 2-CNF formulas and degree-2 polynomial threshold functions. Since efficient algorithms are known for learning these classes of functions, our negative results show that our distribution learning model is indeed significantly more challenging than the standard uniform-distribution Bo ...
... such as monotone 2-CNF formulas and degree-2 polynomial threshold functions. Since efficient algorithms are known for learning these classes of functions, our negative results show that our distribution learning model is indeed significantly more challenging than the standard uniform-distribution Bo ...
Fast Portscan Detection Using Sequential Hypothesis
... In general, we consider it acceptable to flag any remote host as a scanner if it turns out that that host would never subsequently make a useful connection, where “useful” means successfully established, data transferred, and, to the degree we can determine, the transfer was benign. Clearly, assessi ...
... In general, we consider it acceptable to flag any remote host as a scanner if it turns out that that host would never subsequently make a useful connection, where “useful” means successfully established, data transferred, and, to the degree we can determine, the transfer was benign. Clearly, assessi ...
Logical Foundations of Induction
... experiments such as between heat and extension of iron, and since the extension of iron has a natural cause, we naturally conclude from constant relation between heat and extension that heat is the cause, and if so, we have right to make the generalization that when iron is subjected to heat it exte ...
... experiments such as between heat and extension of iron, and since the extension of iron has a natural cause, we naturally conclude from constant relation between heat and extension that heat is the cause, and if so, we have right to make the generalization that when iron is subjected to heat it exte ...
Building large-scale Bayesian Networks``, The Knowledge
... exploitation. The ®rst barrier is that of producing the ``right'' graphÐone that it is a sensible model of the types of reasoning being applied. The second barrier occurs when eliciting the conditional probability values, from a domain expert. For a graph containing many combinations of nodes, where ...
... exploitation. The ®rst barrier is that of producing the ``right'' graphÐone that it is a sensible model of the types of reasoning being applied. The second barrier occurs when eliciting the conditional probability values, from a domain expert. For a graph containing many combinations of nodes, where ...
Combinatorial theorems in sparse random sets
... the expected number of 3-term progressions in [n]p is less than n1/2 /8, while the expected number of elements of [n]p is n1/2 /2. Therefore, one can almost always remove an element from each progression and still be left with at least half the elements of [n]p . For longer progressions, the situati ...
... the expected number of 3-term progressions in [n]p is less than n1/2 /8, while the expected number of elements of [n]p is n1/2 /2. Therefore, one can almost always remove an element from each progression and still be left with at least half the elements of [n]p . For longer progressions, the situati ...
Ars Conjectandi
Ars Conjectandi (Latin for The Art of Conjecturing) is a book on combinatorics and mathematical probability written by Jakob Bernoulli and published in 1713, eight years after his death, by his nephew, Niklaus Bernoulli. The seminal work consolidated, apart from many combinatorial topics, many central ideas in probability theory, such as the very first version of the law of large numbers: indeed, it is widely regarded as the founding work of that subject. It also addressed problems that today are classified in the twelvefold way, and added to the subjects; consequently, it has been dubbed an important historical landmark in not only probability but all combinatorics by a plethora of mathematical historians. The importance of this early work had a large impact on both contemporary and later mathematicians; for example, Abraham de Moivre.Bernoulli wrote the text between 1684 and 1689, including the work of mathematicians such as Christiaan Huygens, Gerolamo Cardano, Pierre de Fermat, and Blaise Pascal. He incorporated fundamental combinatorial topics such as his theory of permutations and combinations—the aforementioned problems from the twelvefold way—as well as those more distantly connected to the burgeoning subject: the derivation and properties of the eponymous Bernoulli numbers, for instance. Core topics from probability, such as expected value, were also a significant portion of this important work.