• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,734
Next 10 →

The Contourlet Transform: An Efficient Directional Multiresolution Image Representation

by Minh N. Do, Martin Vetterli - IEEE TRANSACTIONS ON IMAGE PROCESSING
"... The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known. In this paper, we pursue a “true” two-dimensional transform that can capture the intrinsic geometrical structure t ..."
Abstract - Cited by 513 (20 self) - Add to MetaCart
The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known. In this paper, we pursue a “true” two-dimensional transform that can capture the intrinsic geometrical structure

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
in a more gen eral setting? We compare the marginals com puted using loopy propagation to the exact ones in four Bayesian network architectures, including two real-world networks: ALARM and QMR. We find that the loopy beliefs of ten converge and when they do, they give a good approximation

Similarity and Utility in Non-Numerical Domains

by Klaus-dieter Althoff, Michael M. Richter, D- Kaiserslautern - In Mathematische Methoden der Wirtschaftswissenschaften, Physika-Verlag , 1999
"... In complex situations that arise in the context of the design of large processes, the fault diagnosis of airplanes, or the organization of companies, one has to find good or best solutions although the problems are not clearly defined mathematically. Case-based reasoning (CBR) supports the use of re ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
In complex situations that arise in the context of the design of large processes, the fault diagnosis of airplanes, or the organization of companies, one has to find good or best solutions although the problems are not clearly defined mathematically. Case-based reasoning (CBR) supports the use

Efficient exact stochastic simulation of chemical systems with many species and many channels

by Michael A. Gibson, Jehoshua Bruck - J. Phys. Chem. A , 2000
"... There are two fundamental ways to view coupled systems of chemical equations: as continuous, represented by differential equations whose variables are concentrations, or as discrete, represented by stochastic processes whose variables are numbers of molecules. Although the former is by far more comm ..."
Abstract - Cited by 427 (5 self) - Add to MetaCart
common, systems with very small numbers of molecules are important in some applications (e.g., in small biological cells or in surface processes). In both views, most complicated systems with multiple reaction channels and multiple chemical species cannot be solved analytically. There are exact numerical

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
These findings suggest looking beyond the pure contingent-claims viewpoint when searching for the determinants of credit spread changes, since one might expect to observe a liquidity premium. Thus, we also examine the extent to which credit spread changes can be explained by proxies for liquidity changes. Our

1 Differences Between Numerical Software and Nonnumerical Ones

by Ran Real(k
"... Due to the limitation on the precision of computer numbers approximating real numbers, finite precision computation is different from conventional mathematics. Well-known examples are: (a + b) + c = a + (b + c)? ..."
Abstract - Add to MetaCart
Due to the limitation on the precision of computer numbers approximating real numbers, finite precision computation is different from conventional mathematics. Well-known examples are: (a + b) + c = a + (b + c)?

Predicting Data Cache Misses in Non-Numeric Applications Through Correlation Profiling

by Todd Mowry, Chi-keung Luk - In MICRO-30 , 1997
"... To maximize the benefit and minimize the overhead of software-based latency tolerance techniques, we would like to apply them precisely to the set of dynamic references that suffer cache misses. Unfortunately, the information provided by the state-of-theart cache miss profiling technique (summary pr ..."
Abstract - Cited by 38 (4 self) - Add to MetaCart
the caching behavior with the associated dynamic context. Our experimental results demonstrate that roughly half of the 22 non-numeric applications we study can potentially enjoy significant reductions in memory stall time by exploiting at least one of the three forms of correlation profiling we consider. 1

Design of Numerical Software - Differences Between Numerical Software and Nonnumerical Ones

by S. Qiao, Ran Real(k
"... RETURN END How do we write out a specication for this program? Obviously, any value returned by RAN lies between 0 and 1. But this is not complete and precise. If there is a mistake causing 100001 to be replaced by 10001, can we nd CS760, S. Qiao Part 2 Page 2 out this mistake by checking the speci ..."
Abstract - Add to MetaCart
the specication and testing the program? A precise and complete specication might exist, it is certainly hard to determine. Does that mean we have to give up on specifying numerical software? No. In the following example, we show how we might go about a speci cation regarding numerical issues. Consider

Weighted Essentially Non-Oscillatory Schemes

by Stanley Osher, Tony Chan, Xu-dong Liu, Xu-dong Liu , 1994
"... In this paper we introduce a new version of ENO (Essentially NonOscillatory) shock-capturing schemes which we call Weighted ENO. The main new idea is that, instead of choosing the "smoothest" stencil to pick one interpolating polynomial for the ENO reconstruction, we use a convex combinati ..."
Abstract - Cited by 326 (8 self) - Add to MetaCart
combination of all candidates to achieve the essentially non-oscillatory property, while additionally obtaining one order of improvement in accuracy. The resulting Weighted ENO schemes are based on cell-averages and a TVD Runge-Kutta time discretization. Preliminary encouraging numerical experiments are given.

A Unique Approach for Watermarking Non-numeric Relational Database

by Rajneesh Kaur Bedi, Pune India, Purva Gujarathi, Ashish Kulkarni, Poonam Gundecha
"... In today‟s transient world, securing digital assets is very important. For data authentication and integrity of the relational database we have proposed a secure method which uses both semantic and syntactic techniques to watermark the tuple in a relation. The Watermarking technique is dependent on ..."
Abstract - Add to MetaCart
on secret key and on the relation. The proposed algorithm is based on the concept of predefined signals for ASCII characters. A secret key is generated by using these signals only. To embed a watermark we are using the concept of abbreviations for words and also one syntactic approach, if former technique
Next 10 →
Results 1 - 10 of 6,734
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University