• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,390
Next 10 →

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
. That is, we replaced the reference to >.� ) in and similarly for 11"�) in Equation 3, where 0 :::; J.l :::; 1 is the momentum term. It is easy to show that if the modified system of equations converges to a fixed point F, then F is also a fixed point of the original system (since if>.� ) = >

Classification using Intersection Kernel Support Vector Machines is Efficient ∗

by Subhransu Maji, Alexander C. Berg, Jitendra Malik
"... Straightforward classification using kernelized SVMs requires evaluating the kernel for a test vector and each of the support vectors. For a class of kernels we show that one can do this much more efficiently. In particular we show that one can build histogram intersection kernel SVMs (IKSVMs) with ..."
Abstract - Cited by 256 (10 self) - Add to MetaCart
Straightforward classification using kernelized SVMs requires evaluating the kernel for a test vector and each of the support vectors. For a class of kernels we show that one can do this much more efficiently. In particular we show that one can build histogram intersection kernel SVMs (IKSVMs

Learning methods for generic object recognition with invariance to pose and lighting

by Yann Lecun, Fu Jie Huang, Léon Bottou - In Proceedings of CVPR’04 , 2004
"... We assess the applicability of several popular learning methods for the problem of recognizing generic visual categories with invariance to pose, lighting, and surrounding clutter. A large dataset comprising stereo image pairs of 50 uniform-colored toys under 36 angles, 9 azimuths, and 6 lighting co ..."
Abstract - Cited by 253 (18 self) - Add to MetaCart
of the objects with various amounts of variability and surrounding clutter were used for training and testing. Nearest Neighbor methods, Support Vector Machines, and Convolutional Networks, operating on raw pixels or on PCA-derived features were tested. Test error rates for unseen object instances placed

Can Clone Detection Support Test Comprehension?

by Benedikt Hauptmann, Maximilian Junker, Sebastian Eder, Technische Universität München, Elmar Juergens, Rudolf Vaas
"... Abstract—Tests are central artifacts of software systems. Therefore, understanding tests is essential for activities such as maintenance, test automation, and efficient execution. Redundancies in tests may significantly decrease their understandability. Clone detection is a technique to find similar ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract—Tests are central artifacts of software systems. Therefore, understanding tests is essential for activities such as maintenance, test automation, and efficient execution. Redundancies in tests may significantly decrease their understandability. Clone detection is a technique to find

Support vector domain description

by David M. J. Tax, Robert P. W. Duin - Pattern Recognition Letters , 1999
"... This paper shows the use of a data domain description method, inspired by the support vector machine by Vapnik, called the support vector domain description (SVDD). This data description can be used for novelty or outlier detection. A spherically shaped decision boundary around a set of objects is c ..."
Abstract - Cited by 181 (9 self) - Add to MetaCart
, the fraction of the training objects which will be rejected, can be estimated immediately from the description without the use of an independent test set, which makes this method data e cient. The support vector domain description is compared with other outlier detection methods on real data. Ó 1999 Elsevier

Jcrasher: an automatic robustness tester for java

by Christoph Csallner, Yannis Smaragdakis - Software: Practice and Experience , 2004
"... JCrasher is an automatic robustness testing tool for Java code. JCrasher examines the type information of a set of Java classes and constructs code fragments that will create instances of different types to test the behavior of public methods under random data. JCrasher attempts to detect bugs by ca ..."
Abstract - Cited by 171 (6 self) - Add to MetaCart
JCrasher is an automatic robustness testing tool for Java code. JCrasher examines the type information of a set of Java classes and constructs code fragments that will create instances of different types to test the behavior of public methods under random data. JCrasher attempts to detect bugs

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive

A critical role for the right fronto-insular cortex in switching between central-executive and default-mode networks.

by Devarajan Sridharan , † ‡ , Daniel J Levitin , Vinod Menon - Proc Natl Acad Sci USA , 2008
"... Cognitively demanding tasks that evoke activation in the brain's central-executive network (CEN) have been consistently shown to evoke decreased activation (deactivation) in the default-mode network (DMN). The neural mechanisms underlying this switch between activation and deactivation of larg ..."
Abstract - Cited by 178 (1 self) - Add to MetaCart
simulation of large-scale brain networks, that even in the absence of external stimuli, certain nodes can regulate other nodes and function as hubs (24). NEUROSCIENCE Our aim was to test the hypothesis that common network switching mechanisms apply across tasks with varying cognitive demands and differing

Detecting Past and Present Intrusions through Vulnerability-Specific Predicates

by Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen , 2005
"... Most systems contain software with yet-to-be-discovered security vulnerabilities. When a vulnerability is disclosed, administrators face the grim reality that they have been running software which was open to attack. Sites that value availability may be forced to continue running this vulnerable sof ..."
Abstract - Cited by 147 (8 self) - Add to MetaCart
software until the accompanying patch has been tested. Our goal is to improve security by detecting intrusions that occurred before the vulnerability was disclosed and by detecting and responding to intrusions that are attempted after the vulnerability is disclosed. We detect when a vulnerability

Multidimensional Detective

by Alfred Inselberg, Tova Avidan - in Proc. of IEEE Information Visualization ’97 , 1997
"... Automation has arrived to Parallel Coordinates. A geometrically motivated classifier is presented and applied, with both training and testing stages, to 3 real datasets. Our results compared to those from 23 other classifiers have the least error. The algorithm is based on parallel coordinates and: ..."
Abstract - Cited by 101 (1 self) - Add to MetaCart
Automation has arrived to Parallel Coordinates. A geometrically motivated classifier is presented and applied, with both training and testing stages, to 3 real datasets. Our results compared to those from 23 other classifiers have the least error. The algorithm is based on parallel coordinates and
Next 10 →
Results 1 - 10 of 3,390
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University