6,513 research outputs found

    An empirical comparison of supervised machine learning techniques in bioinformatics

    Get PDF
    Research in bioinformatics is driven by the experimental data. Current biological databases are populated by vast amounts of experimental data. Machine learning has been widely applied to bioinformatics and has gained a lot of success in this research area. At present, with various learning algorithms available in the literature, researchers are facing difficulties in choosing the best method that can apply to their data. We performed an empirical study on 7 individual learning systems and 9 different combined methods on 4 different biological data sets, and provide some suggested issues to be considered when answering the following questions: (i) How does one choose which algorithm is best suitable for their data set? (ii) Are combined methods better than a single approach? (iii) How does one compare the effectiveness of a particular algorithm to the others

    Shrewd Selection Speeds Surfing: Use Smart EXP3!

    Full text link
    In this paper, we explore the use of multi-armed bandit online learning techniques to solve distributed resource selection problems. As an example, we focus on the problem of network selection. Mobile devices often have several wireless networks at their disposal. While choosing the right network is vital for good performance, a decentralized solution remains a challenge. The impressive theoretical properties of multi-armed bandit algorithms, like EXP3, suggest that it should work well for this type of problem. Yet, its real-word performance lags far behind. The main reasons are the hidden cost of switching networks and its slow rate of convergence. We propose Smart EXP3, a novel bandit-style algorithm that (a) retains the good theoretical properties of EXP3, (b) bounds the number of switches, and (c) yields significantly better performance in practice. We evaluate Smart EXP3 using simulations, controlled experiments, and real-world experiments. Results show that it stabilizes at the optimal state, achieves fairness among devices and gracefully deals with transient behaviors. In real world experiments, it can achieve 18% faster download over alternate strategies. We conclude that multi-armed bandit algorithms can play an important role in distributed resource selection problems, when practical concerns, such as switching costs and convergence time, are addressed.Comment: Full pape

    Toward a typology of organizational creativity

    Get PDF

    Some Remarks About the Two-Matrix Penner Model and the Kazakov-Migdal Model

    Full text link
    I consider the Hermitean two-matrix model with a logarithmic potential which is associated in the one-matrix case with the Penner model. Using loop equations I find an explicit solution of the model at large N (or in the spherical approximation) and demonstrate that it solves the corresponding Riemann-Hilbert problem. I construct the potential of the Kazakov-Migdal model on a D-dimensional lattice, which turns out to be a sum of two logarithms as well, whose large-N solution is given by the same formulas. In the "naive" continuum limit this potential recovers in D<4 dimensions the standard scalar theory with quartic self-interaction. I exploit the solution to calculate explicitly the pair correlator of gauge fields in the Kazakov-Migdal model with the logarithmic potential.Comment: Latex, 13 pages, NBI-HE-93-2
    • 

    corecore