Expected value

Results: 1160



#Item
61Routing Hazardous Materials on Time-Dependent Networks using Conditional Value-at-Risk Iakovos Toumazisa , Changhyun Kwona,1 a  Department of Industrial and Systems Engineering

Routing Hazardous Materials on Time-Dependent Networks using Conditional Value-at-Risk Iakovos Toumazisa , Changhyun Kwona,1 a Department of Industrial and Systems Engineering

Add to Reading List

Source URL: toumiak.com

Language: English - Date: 2014-05-21 14:13:54
62  D Marques, T.A., S.T. Buckland, D.L. Borchers, E. Rexstad and L. ThomasDistance sampling. Ppin Lovric, M. (Ed.), International Encyclopedia of Statistical Science, Springer-Verlag, Berlin.

 D Marques, T.A., S.T. Buckland, D.L. Borchers, E. Rexstad and L. ThomasDistance sampling. Ppin Lovric, M. (Ed.), International Encyclopedia of Statistical Science, Springer-Verlag, Berlin.

Add to Reading List

Source URL: www.ruwpa.st-and.ac.uk

Language: English - Date: 2011-02-04 05:38:25
63II-1  CHAPIER II MAXI.MAL PAHTIAL SUMS 14. · The Di.stribution of the M:i_ximal Partial Surn.

II-1 CHAPIER II MAXI.MAL PAHTIAL SUMS 14. · The Di.stribution of the M:i_ximal Partial Surn.

Add to Reading List

Source URL: www.eurandom.tue.nl

Language: English - Date: 2016-07-13 03:43:19
64Vol. 18 noPages 1382–1390 BIOINFORMATICS  Subtle motifs: defining the limits of motif finding

Vol. 18 noPages 1382–1390 BIOINFORMATICS Subtle motifs: defining the limits of motif finding

Add to Reading List

Source URL: www.maths.usyd.edu.au

Language: English - Date: 2005-06-21 16:21:29
65A NNALES DE L’I. H. P., SECTION B  E NDRE C SÁKI PÁL R ÉVÉSZ JAY ROSEN Functional laws of the iterated logarithm for local

A NNALES DE L’I. H. P., SECTION B E NDRE C SÁKI PÁL R ÉVÉSZ JAY ROSEN Functional laws of the iterated logarithm for local

Add to Reading List

Source URL: www.math.csi.cuny.edu

Language: English - Date: 2009-05-03 17:57:56
66FW micro loan application form Oct 2015 web.indd

FW micro loan application form Oct 2015 web.indd

Add to Reading List

Source URL: www.financewales.co.uk

Language: English - Date: 2015-11-10 08:32:35
67Combining Weak Statistical Evidence in Cyber Security Nick Heard Department of Mathematics, Imperial College London; Heilbronn Institute for Mathematical Research, University of Bristol

Combining Weak Statistical Evidence in Cyber Security Nick Heard Department of Mathematics, Imperial College London; Heilbronn Institute for Mathematical Research, University of Bristol

Add to Reading List

Source URL: ida2015.univ-st-etienne.fr

Language: English - Date: 2015-10-23 08:22:41
68All-Termination(SCP) Panagiotis Manolios and Aaron Turon Northeastern University {pete,turon}@ccs.neu.edu Abstract. We recently introduced the All-Termination(T ) problem: given a termination solver T and a function F ,

All-Termination(SCP) Panagiotis Manolios and Aaron Turon Northeastern University {pete,turon}@ccs.neu.edu Abstract. We recently introduced the All-Termination(T ) problem: given a termination solver T and a function F ,

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2010-01-10 16:47:16
69LNRE models Baroni & Evert Computing expectations Expectation = sample average

LNRE models Baroni & Evert Computing expectations Expectation = sample average

Add to Reading List

Source URL: zipfr.r-forge.r-project.org

Language: English - Date: 2008-11-10 18:29:37
70Journal of Machine Learning Research  Submitted 5/06; Revised 10/06; Published 3/07 Consistent Feature Selection for Pattern Recognition in Polynomial Time

Journal of Machine Learning Research Submitted 5/06; Revised 10/06; Published 3/07 Consistent Feature Selection for Pattern Recognition in Polynomial Time

Add to Reading List

Source URL: www.jmlr.org

Language: English - Date: 2007-03-15 15:29:20