• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,443
Next 10 →

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
. Introduction The task of calculating posterior marginals on nodes in an arbitrary Bayesian network is known to be NP hard In this paper we investigate the approximation performance of "loopy belief propagation". This refers to using the well-known Pearl polytree algorithm [12] on a Bayesian network

Self Organization of a Massive Document Collection

by Teuvo Kohonen, Samuel Kaski, Krista Lagus, Jarkko Salojarvi, Vesa Paatero, Antti Saarela - IEEE Transactions on Neural Networks
"... This article describes the implementation of a system that is able to organize vast document collections according to textual similarities. It is based on the Self-Organizing Map (SOM) algorithm. As the feature vectors for the documents we use statistical representations of their vocabularies. The m ..."
Abstract - Cited by 264 (15 self) - Add to MetaCart
as random projections of weighted word histograms. Keywords Data mining, exploratory data analysis, knowledge discovery, large databases, parallel implementation, random projection, Self-Organizing Map (SOM), textual documents. I. Introduction A. From simple searches to browsing of self-organized data

Improving Register Allocation for Subscripted Variables

by David Callahan, Steve Carr, Ken Kennedy , 1990
"... INTRODUCTION By the late 1980s, memory system performance and CPU performance had already begun to diverge. This trend made effective use of the register file imperative for excellent performance. Although most compilers at that time allocated scalar variables to registers using graph coloring with ..."
Abstract - Cited by 225 (35 self) - Add to MetaCart
INTRODUCTION By the late 1980s, memory system performance and CPU performance had already begun to diverge. This trend made effective use of the register file imperative for excellent performance. Although most compilers at that time allocated scalar variables to registers using graph coloring

Data Mining using MLC++: A Machine Learning Library in C++

by Ron Kohavi, Dan Sommerfield, James Dougherty - INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS , 1997
"... Data mining algorithmsincluding machine learning, statistical analysis, and pattern recognition techniques can greatly improve our understanding of data warehouses that are now becoming more widespread. In this paper, we focus on classification algorithms and review the need for multiple classificat ..."
Abstract - Cited by 171 (20 self) - Add to MetaCart
Data mining algorithmsincluding machine learning, statistical analysis, and pattern recognition techniques can greatly improve our understanding of data warehouses that are now becoming more widespread. In this paper, we focus on classification algorithms and review the need for multiple

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
provides quantifiable assessments of outcomes under uncertainty and has gone a long way to explain human and animal decision making, even though more recent data cast doubt on the logic in some decision situations A Call for Behavioral Theory Primary sensory systems have dedicated physical and chemical

From Fairness to Chance

by Luca De Alfaro - In Proceedings, Probabilistic Methods in Verification (PROBMIV'98 , 1999
"... Fairness is a mathematical abstraction used in the modeling of a wide range of phenomena, including concurrency, scheduling, and probability. In this paper, we study fairness in the context of probabilistic systems, and we introduce probabilistic fairness, a novel notion of fairness that is itself d ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
of fairness for probabilistic systems, and we provide algorithms that solve the verification problem for various classes of probabilistic properties on finite-state systems with fairness. 1 Introduction The use of formal methods for the analysis and verification of systems requires a mathematical model

LCLint: A Tool for Using Specifications to Check Code

by David Evans, John Guttag, James Horning, Yang Meng Tan - In FSE , 1994
"... This paper describes LCLint, an efficient and flexible tool that accepts as input programs (written in ANSI C) and various levels of formal specification. Using this information, LCLint reports inconsistencies between a program and its specification. We also describe our experience using LCLint to h ..."
Abstract - Cited by 131 (1 self) - Add to MetaCart
to help understand, document, and re-engineer legacy code. Keywords: C, Larch, LCLint, lint, specifications, static checking 1 Introduction Software engineers have long understood that static analysis of program texts can both reduce the number of residual errors andimprove the maintainability of programs

Applications of Fair Testing

by E. Brinksma, A. Rensink, W. Vogler , 1996
"... In this paper we present the application of the fair testing pre-order , introduced in a previous paper, to the specification and analysis of distributed systems. This pre-order combines some features of the standard testing pre-orders, viz. the possibility to refine a specification by the resolutio ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
In this paper we present the application of the fair testing pre-order , introduced in a previous paper, to the specification and analysis of distributed systems. This pre-order combines some features of the standard testing pre-orders, viz. the possibility to refine a specification

PiOS: Detecting Privacy Leaks in iOS Applications

by Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna
"... With the introduction of Apple’s iOS and Google’s Android operating systems, the sales of smartphones have exploded. These smartphones have become powerful devices that are basically miniature versions of personal computers. However, the growing popularity and sophistication of smartphones have also ..."
Abstract - Cited by 127 (3 self) - Add to MetaCart
OS uses static analysis to detect data flows in Mach-0 binaries, compiled from Objective-C code. This is a challenging task due to the way in which Objective-C method calls are implemented. We have analyzed more than 1,400 iPhone applications. Our experiments show that, with the exception of a few bad

Mining Data Streams: A Review.

by Mohamed Medhat Gaber , Arkady Zaslavsky , Shonali Krishnaswamy - SIGMOD Record, , 2005
"... Abstract The recent advances in hardware and software have enabled the capture of different measurements of data in a wide range of fields. These measurements are generated continuously and in a very high fluctuating data rates. Examples include sensor networks, web logs, and computer network traff ..."
Abstract - Cited by 113 (6 self) - Add to MetaCart
of data stream mining applications. The paper is organized as follows. Section 2 presents the theoretical background of data stream analysis. Mining data stream techniques and systems are reviewed in sections 3 and 4 respectively. Open and addressed research issues in this growing field are discussed
Next 10 →
Results 1 - 10 of 2,443
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University