• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,808
Next 10 →

Posterior Predictive Assessment of Model Fitness Via Realized Discrepancies

by Andrew Gelman, Xiao-li Meng, Hal Stern - Statistica Sinica , 1996
"... Abstract: This paper considers Bayesian counterparts of the classical tests for goodness of fit and their use in judging the fit of a single Bayesian model to the observed data. We focus on posterior predictive assessment, in a framework that also includes conditioning on auxiliary statistics. The B ..."
Abstract - Cited by 348 (39 self) - Add to MetaCart
the details of the posterior predictive approach in two problems: estimation in a model with inequality constraints on the parameters, and estimation in a mixture model. In all three examples, standard test statistics (either a χ 2 or a likelihood ratio) are not pivotal: the difficulty is not just how

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one

Graph Cuts and Efficient N-D Image Segmentation

by Yuri Boykov, Gareth Funka-Lea , 2006
"... Combinatorial graph cut algorithms have been successfully applied to a wide range of problems in vision and graphics. This paper focusses on possibly the simplest application of graph-cuts: segmentation of objects in image data. Despite its simplicity, this application epitomizes the best features ..."
Abstract - Cited by 307 (7 self) - Add to MetaCart
present motivation and detailed technical description of the basic combinatorial optimization framework for image segmentation via s/t graph cuts. After the general concept of using binary graph cut algorithms for object segmentation was first proposed and tested in Boykov and Jolly (2001), this idea

Adapting to Network and Client Variability via On-Demand Dynamic Distillation

by Armando Fox, Steven D. Gribble, Eric A. Brewer, Elan Amir , 1996
"... The explosive growth of the Internet and the proliferation of smart cellular phones and handheld wireless devices is widening an already large gap between Internet clients. Clients vary in their hardware resources, software sophistication, and quality of connectivity, yet server support for client v ..."
Abstract - Cited by 230 (11 self) - Add to MetaCart
on semantically typed data, tailoring content to the specific constraints of the client. We instantiate our design principles in a proxy architecture that further exploits typed data to enable application-level management of scarce network resources. Our proxy architecture generalizes previous work addressing all

Stress, coping and social support processes: Where are we? What next?

by Peggy A Thoits - Journal of Health and Social Behavior, , 1995
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract - Cited by 259 (1 self) - Add to MetaCart
and mental health both directly and as stress buffers, the theoretical mechanisms through which they do so still require elaboration and testing. New work suggests that coping flexibility and structural constraints on individuals' coping efforts may be important to pursue. Promising new directions

An Open-Ended Finite Domain Constraint Solver

by Mats Carlsson, Greger Ottosson, Björn Carlson , 1997
"... We describe the design and implementation of a finite domain constraint solver embedded in a Prolog system using an extended unification mechanism via attributed variables as a generic constraint interface. The solver is essentially a scheduler for indexicals, i.e. reactive functional rules encodin ..."
Abstract - Cited by 194 (8 self) - Add to MetaCart
We describe the design and implementation of a finite domain constraint solver embedded in a Prolog system using an extended unification mechanism via attributed variables as a generic constraint interface. The solver is essentially a scheduler for indexicals, i.e. reactive functional rules

Theory of the consumption function, with and without liquidity constraints (expanded version), NBER Working Paper No

by Christopher D. Carroll , 2001
"... F ifteen years ago, Milton Friedman’s 1957 treatise A Theory of the ConsumptionFunction seemed badly dated. Dynamic optimization theory had not beenemployed much in economics when Friedman wrote, and utility theory was still comparatively primitive, so his statement of the “permanent income hypothe- ..."
Abstract - Cited by 161 (6 self) - Add to MetaCart
F ifteen years ago, Milton Friedman’s 1957 treatise A Theory of the ConsumptionFunction seemed badly dated. Dynamic optimization theory had not beenemployed much in economics when Friedman wrote, and utility theory was still comparatively primitive, so his statement of the “permanent income hypothe

A ‘‘vertically Lagrangian’’ finite-volume dynamical core for global models

by Shian-jiann Lin - Weather Rev , 2004
"... A finite-volume dynamical core with a terrain-following Lagrangian control-volume discretization is described. The vertically Lagrangian discretization reduces the dimensionality of the physical problem from three to two with the resulting dynamical system closely resembling that of the shallow wate ..."
Abstract - Cited by 164 (10 self) - Add to MetaCart
parameterizations’ ’ and to prevent severe distortion of the Lagrangian surfaces. Deterministic baroclinic wave-growth tests and long-term integrations using the Held–Suarez forcing are presented. Impact of the monotonicity constraint is discussed. 1.

Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs

by Yin Wang
"... Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous burdens on developers, entail high runtime performance overheads, or offer no help for unmodified legacy code. Gadara autom ..."
Abstract - Cited by 47 (8 self) - Add to MetaCart
automates dynamic deadlock avoidance for conventional multithreaded programs. It employs whole-program static analysis to model programs, and Discrete Control Theory to synthesize lightweight, decentralized, highly concurrent logic that controls them at runtime. Gadara is safe, and can be applied to legacy

A generalized hidden markov model for the recognition of human genes

by David Kulp, David Haussler, Martin G. Reese, Frank H. Eeckman - in DNA. In: Proc. Int. Conf. Intell , 1996
"... We present a statistical model of genes in DNA. A Generalized Hidden Markov Model (GtlMM) provides the framework for describing the grasnmar of a legal parse of a DNA sequence (Stormo & Haussler 1994). Probabilities are assigned to transitions between states in tile GItMM and to the generation o ..."
Abstract - Cited by 182 (15 self) - Add to MetaCart
of each nucleotide base given a particular state. Machine learning techniques are applied to optimize these probabilities using a standardized training set. Given a new candidate sequence, the best parse is deduced from the model using a dynamic programlning algorithm to identify the path through
Next 10 →
Results 1 - 10 of 4,808
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University