Results 1 - 10
of
4,808
Posterior Predictive Assessment of Model Fitness Via Realized Discrepancies
- Statistica Sinica
, 1996
"... Abstract: This paper considers Bayesian counterparts of the classical tests for goodness of fit and their use in judging the fit of a single Bayesian model to the observed data. We focus on posterior predictive assessment, in a framework that also includes conditioning on auxiliary statistics. The B ..."
Abstract
-
Cited by 348 (39 self)
- Add to MetaCart
the details of the posterior predictive approach in two problems: estimation in a model with inequality constraints on the parameters, and estimation in a mixture model. In all three examples, standard test statistics (either a χ 2 or a likelihood ratio) are not pivotal: the difficulty is not just how
Automated Whitebox Fuzz Testing
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract
-
Cited by 311 (25 self)
- Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one
Graph Cuts and Efficient N-D Image Segmentation
, 2006
"... Combinatorial graph cut algorithms have been successfully applied to a wide range of problems in vision and graphics. This paper focusses on possibly the simplest application of graph-cuts: segmentation of objects in image data. Despite its simplicity, this application epitomizes the best features ..."
Abstract
-
Cited by 307 (7 self)
- Add to MetaCart
present motivation and detailed technical description of the basic combinatorial optimization framework for image segmentation via s/t graph cuts. After the general concept of using binary graph cut algorithms for object segmentation was first proposed and tested in Boykov and Jolly (2001), this idea
Adapting to Network and Client Variability via On-Demand Dynamic Distillation
, 1996
"... The explosive growth of the Internet and the proliferation of smart cellular phones and handheld wireless devices is widening an already large gap between Internet clients. Clients vary in their hardware resources, software sophistication, and quality of connectivity, yet server support for client v ..."
Abstract
-
Cited by 230 (11 self)
- Add to MetaCart
on semantically typed data, tailoring content to the specific constraints of the client. We instantiate our design principles in a proxy architecture that further exploits typed data to enable application-level management of scarce network resources. Our proxy architecture generalizes previous work addressing all
Stress, coping and social support processes: Where are we? What next?
- Journal of Health and Social Behavior,
, 1995
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract
-
Cited by 259 (1 self)
- Add to MetaCart
and mental health both directly and as stress buffers, the theoretical mechanisms through which they do so still require elaboration and testing. New work suggests that coping flexibility and structural constraints on individuals' coping efforts may be important to pursue. Promising new directions
An Open-Ended Finite Domain Constraint Solver
, 1997
"... We describe the design and implementation of a finite domain constraint solver embedded in a Prolog system using an extended unification mechanism via attributed variables as a generic constraint interface. The solver is essentially a scheduler for indexicals, i.e. reactive functional rules encodin ..."
Abstract
-
Cited by 194 (8 self)
- Add to MetaCart
We describe the design and implementation of a finite domain constraint solver embedded in a Prolog system using an extended unification mechanism via attributed variables as a generic constraint interface. The solver is essentially a scheduler for indexicals, i.e. reactive functional rules
Theory of the consumption function, with and without liquidity constraints (expanded version), NBER Working Paper No
, 2001
"... F ifteen years ago, Milton Friedman’s 1957 treatise A Theory of the ConsumptionFunction seemed badly dated. Dynamic optimization theory had not beenemployed much in economics when Friedman wrote, and utility theory was still comparatively primitive, so his statement of the “permanent income hypothe- ..."
Abstract
-
Cited by 161 (6 self)
- Add to MetaCart
F ifteen years ago, Milton Friedman’s 1957 treatise A Theory of the ConsumptionFunction seemed badly dated. Dynamic optimization theory had not beenemployed much in economics when Friedman wrote, and utility theory was still comparatively primitive, so his statement of the “permanent income hypothe
A ‘‘vertically Lagrangian’’ finite-volume dynamical core for global models
- Weather Rev
, 2004
"... A finite-volume dynamical core with a terrain-following Lagrangian control-volume discretization is described. The vertically Lagrangian discretization reduces the dimensionality of the physical problem from three to two with the resulting dynamical system closely resembling that of the shallow wate ..."
Abstract
-
Cited by 164 (10 self)
- Add to MetaCart
parameterizations’ ’ and to prevent severe distortion of the Lagrangian surfaces. Deterministic baroclinic wave-growth tests and long-term integrations using the Held–Suarez forcing are presented. Impact of the monotonicity constraint is discussed. 1.
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs
"... Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous burdens on developers, entail high runtime performance overheads, or offer no help for unmodified legacy code. Gadara autom ..."
Abstract
-
Cited by 47 (8 self)
- Add to MetaCart
automates dynamic deadlock avoidance for conventional multithreaded programs. It employs whole-program static analysis to model programs, and Discrete Control Theory to synthesize lightweight, decentralized, highly concurrent logic that controls them at runtime. Gadara is safe, and can be applied to legacy
A generalized hidden markov model for the recognition of human genes
- in DNA. In: Proc. Int. Conf. Intell
, 1996
"... We present a statistical model of genes in DNA. A Generalized Hidden Markov Model (GtlMM) provides the framework for describing the grasnmar of a legal parse of a DNA sequence (Stormo & Haussler 1994). Probabilities are assigned to transitions between states in tile GItMM and to the generation o ..."
Abstract
-
Cited by 182 (15 self)
- Add to MetaCart
of each nucleotide base given a particular state. Machine learning techniques are applied to optimize these probabilities using a standardized training set. Given a new candidate sequence, the best parse is deduced from the model using a dynamic programlning algorithm to identify the path through
Results 1 - 10
of
4,808