Results 1  10
of
13,412
The strength of weak learnability
 MACHINE LEARNING
, 1990
"... This paper addresses the problem of improving the accuracy of an hypothesis output by a learning algorithm in the distributionfree (PAC) learning model. A concept class is learnable (or strongly learnable) if, given access to a Source of examples of the unknown concept, the learner with high prob ..."
Abstract

Cited by 871 (26 self)
 Add to MetaCart
, the construction has some interesting theoretical consequences, including a set of general upper bounds on the complexity of any strong learning algorithm as a function of the allowed error e.
Keying hash functions for message authentication
, 1996
"... The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach inmanyInternet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new cons ..."
Abstract

Cited by 611 (39 self)
 Add to MetaCart
constructions of message authentication schemes based on a cryptographic hash function. Our schemes, NMAC and HMAC, are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths. Moreover we show, in a quantitativeway, that the schemes retain almost all the security
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract

Cited by 622 (2 self)
 Add to MetaCart
with ambiguities regarding the processes by which individuals adapt to changing levels in stimulation. Individuals' levels of activation decrease markedly as a function of familiarity with a given stimulus situation. However, after a period of rest, representation of the same stimulus situation will once
Illusion and wellbeing: A social psychological perspective on mental health.
 Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract

Cited by 988 (20 self)
 Add to MetaCart
evaluations, exaggerated perceptions of control or mastery, and unrealistic optimismcan serve a wide variety of cognitive, affective, and social functions. We also attempt to resolve the following paraPreparation of this article was supported by National Science Foundation Grant BNS 8308524, National Cancer Institute
HMAC: KeyedHashing for Message Authentication
, 1997
"... This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative ..."
Abstract

Cited by 452 (4 self)
 Add to MetaCart
iterative cryptographic hash function, e.g., MD5, SHA1, in combination with a secret shared key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. 1.
BRITE: An approach to universal topology generation,”
 in Proceedings of the IEEE Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems,
, 2001
"... Abstract Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the largescale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function. U ..."
Abstract

Cited by 448 (12 self)
 Add to MetaCart
Abstract Effective engineering of the Internet is predicated upon a detailed understanding of issues such as the largescale structure of its underlying physical topology, the manner in which it evolves over time, and the way in which its constituent components contribute to its overall function
Shape of Dipole Radiative Strength Function for Asymmetric Nuclei
, 2002
"... The semiclassical method for description of the radiative strength function is used for asymmetric nuclei with N ̸ = Z. The theory is based on the linearized VlasovLandau equations in twocomponent finite Fermi liquid. The dependence of the shape E1 strength on the coupling constant between proton a ..."
Abstract
 Add to MetaCart
The semiclassical method for description of the radiative strength function is used for asymmetric nuclei with N ̸ = Z. The theory is based on the linearized VlasovLandau equations in twocomponent finite Fermi liquid. The dependence of the shape E1 strength on the coupling constant between proton
Calculation of Gamma Strength Functions for Photonucleon Reactions
"... The cross section for (γ,N) reaction is important for investigation of nuclear structure, especially in lowenergy giant dipole resonance (GDR). The total cross sections of 12C(γ,n)11C and 12C(γ,p)11B reactions, calculated using TALYS 1.2 nuclear code, are 15.5 to 40 MeV and 15 to 110 MeV, respectiv ..."
Abstract
 Add to MetaCart
V, respectively. In the calculations, the default preequilibrium models and BrinkAxel Lorentzian model in all of the gamma strength functions have been used. The effects of the gamma strength function on the cross section exchange data has determined the most compatible model type. The results are compared
Edge Strength Functions as Shape Priors in Image Segmentation
"... Abstract. Many applications of computer vision requires segmenting out of an object of interest from a given image. Motivated by unlevelsets formulation of Raviv, Kiryati and Sochen [8] and statistical formulation of Leventon, Grimson and Faugeras [6], we present a new image segmentation method whi ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
which accounts for prior shape information. Our method depends on AmbrosioTortorelli approximation of MumfordShah functional. The prior shape is represented by a byproduct of this functional, a smooth edge indicator function, known as the “edge strength function”, which provides a distance
A Study Of Photon Strength Functions By Means Of The TwoStep Cascade Measurement
"... Contents Introduction 3 1 Photon Strength Functions 4 1.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Fluctuation of Partial Radiation Widths . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Theories . . . . . . . . . . . ..."
Abstract
 Add to MetaCart
Contents Introduction 3 1 Photon Strength Functions 4 1.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Fluctuation of Partial Radiation Widths . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Theories
Results 1  10
of
13,412