• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,236
Next 10 →

The Many Modes of Meta

by Stephen Senn - Drug Inf J
"... Many of the reservations that might attach to the use of meta-analysis generaLly uor example, regarding publication bias) do not apply in the specific context of drug develop-ment. A meta-analysis is, in fact, a highly natural and appropriate way to summarize the results of a drug development progra ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Many of the reservations that might attach to the use of meta-analysis generaLly uor example, regarding publication bias) do not apply in the specific context of drug develop-ment. A meta-analysis is, in fact, a highly natural and appropriate way to summarize the results of a drug development

SEMICLASSICAL MANY-MODE FLOQUET THEORY

by Tak-san Ho, Shill- Chu, Jarnes V. Tietz
"... 11 IS shown 11131 the sing.lr-mode I‘loquet formalism of Shirley can be extended to a generalized many-mode Roquet rl,cor>, ) icldins a prxlical non-perturb.rthe technique for the semiclassical treatment of the interaction of a quantum s? \tcm wrh se \ cm1 monochromatic oscillating fields The the ..."
Abstract - Add to MetaCart
11 IS shown 11131 the sing.lr-mode I‘loquet formalism of Shirley can be extended to a generalized many-mode Roquet rl,cor>, ) icldins a prxlical non-perturb.rthe technique for the semiclassical treatment of the interaction of a quantum s? \tcm wrh se \ cm1 monochromatic oscillating fields

FROM ONE MODE TO MANY MODES

by Claude Fabre, Hal Id Sfo, Claude Fabre , 2008
"... HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte p ..."
Abstract - Add to MetaCart
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et a ̀ la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. QUANTUM OPTICS,

The Security of “One-Block-to-Many” Modes of Operation

by Henri Gilbert, France Télécom R&d , 2003
"... In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block output under the control of a secret key K. Such “one-block-to-many ” modes of operation are of frequent use in cryptology. ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block output under the control of a secret key K. Such “one-block-to-many ” modes of operation are of frequent use in cryptology

The JPEG still picture compression standard

by Gregory K. Wallace - Communications of the ACM , 1991
"... This paper is a revised version of an article by the same title and author which appeared in the April 1991 issue of Communications of the ACM. For the past few years, a joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) has been working to establish the first international c ..."
Abstract - Cited by 1138 (0 self) - Add to MetaCart
compression standard for continuous-tone still images, both grayscale and color. JPEG’s proposed standard aims to be generic, to support a wide variety of applications for continuous-tone images. To meet the differing needs of many applications, the JPEG standard includes two basic compression methods, each

Many-mode Entanglement in Continuous-variable Systems

by Helen Sarah Mcaneney, Michio Kaku , 2004
"... This work is dedicated to my loving husband Jonny, without whose support, determination and understanding I would never have reached this far. “In physics, you don’t have to go around making trouble for yourself- nature does it for you.” ..."
Abstract - Add to MetaCart
This work is dedicated to my loving husband Jonny, without whose support, determination and understanding I would never have reached this far. “In physics, you don’t have to go around making trouble for yourself- nature does it for you.”

Graphical models, exponential families, and variational inference

by Martin J. Wainwright, Michael I. Jordan , 2008
"... The formalism of probabilistic graphical models provides a unifying framework for capturing complex dependencies among random variables, and building large-scale multivariate statistical models. Graphical models have become a focus of research in many statistical, computational and mathematical fiel ..."
Abstract - Cited by 819 (28 self) - Add to MetaCart
fields, including bioinformatics, communication theory, statistical physics, combinatorial optimization, signal and image processing, information retrieval and statistical machine learning. Many problems that arise in specific instances — including the key problems of computing marginals and modes

How Iris Recognition Works

by John Daugman , 2003
"... Algorithms developed by the author for recogniz-ing persons by their iris patterns have now been tested in six field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test of statis-tical independence on iris phase st ..."
Abstract - Cited by 509 (4 self) - Add to MetaCart
with extremely high confidence. The high confidence levels are important because they al-low very large databases to be searched exhaustively (one-to-many “identification mode”) without making any false matches, despite so many chances. Biomet-rics lacking this property can only survive one-to-one (“verification

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
that loopy propagation can also work well for graphs with many small loops. At the same time, our experimental results suggest a cautionary note about loopy propagation, showing that the marginals may exhibit oscillations that have very little correlation with the correct marginals. We presented some

A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract - Cited by 462 (7 self) - Add to MetaCart
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises
Next 10 →
Results 1 - 10 of 11,236
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University