Results 1  10
of
1,651,297
Maximum likelihood from incomplete data via the EM algorithm
 JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B
, 1977
"... A broadly applicable algorithm for computing maximum likelihood estimates from incomplete data is presented at various levels of generality. Theory showing the monotone behaviour of the likelihood and convergence of the algorithm is derived. Many examples are sketched, including missing value situat ..."
Abstract

Cited by 11807 (17 self)
 Add to MetaCart
A broadly applicable algorithm for computing maximum likelihood estimates from incomplete data is presented at various levels of generality. Theory showing the monotone behaviour of the likelihood and convergence of the algorithm is derived. Many examples are sketched, including missing value
On the Theory of Matchgate Computations
 Submitted. Also available at Electronic Colloquium on Computational Complexity Report
, 2007
"... Valiant has proposed a new theory of algorithmic computation based on perfect matchings and the Pfaffian. We study the properties of matchgates—the basic building blocks in this new theory. We give a set of algebraic identities which completely characterize these objects in terms of the GrassmannPl ..."
Abstract

Cited by 20 (8 self)
 Add to MetaCart
Valiant has proposed a new theory of algorithmic computation based on perfect matchings and the Pfaffian. We study the properties of matchgates—the basic building blocks in this new theory. We give a set of algebraic identities which completely characterize these objects in terms of the Grassmann
On Blockwise Symmetric Signatures for Matchgates
 ELECTRONIC COLLOQUIUM ON COMPUTATIONAL COMPLEXITY, REPORT NO. 19 (2007)
, 2007
"... We give a classification of blockwise symmetric signatures in the theory of matchgate computations. The main proof technique is matchgate identities, a.k.a. useful GrassmannPlücker identities.
..."
Abstract

Cited by 5 (3 self)
 Add to MetaCart
We give a classification of blockwise symmetric signatures in the theory of matchgate computations. The main proof technique is matchgate identities, a.k.a. useful GrassmannPlücker identities.
Quantum theory, the ChurchTuring principle and the universal quantum computer
, 1985
"... computer ..."
ScaleSpace Theory in Computer Vision
, 1994
"... A basic problem when deriving information from measured data, such as images, originates from the fact that objects in the world, and hence image structures, exist as meaningful entities only over certain ranges of scale. "ScaleSpace Theory in Computer Vision" describes a formal theory fo ..."
Abstract

Cited by 617 (21 self)
 Add to MetaCart
A basic problem when deriving information from measured data, such as images, originates from the fact that objects in the world, and hence image structures, exist as meaningful entities only over certain ranges of scale. "ScaleSpace Theory in Computer Vision" describes a formal theory
Affective Computing
, 1995
"... Recent neurological studies indicate that the role of emotion in human cognition is essential; emotions are not a luxury. Instead, emotions play a critical role in rational decisionmaking, in perception, in human interaction, and in human intelligence. These facts, combined with abilities computers ..."
Abstract

Cited by 1844 (41 self)
 Add to MetaCart
, and both theoretical and practical applications are described for learning, humancomputer interaction, perceptual information retrieval, creative arts and entertainment, human health, and machine intelligence. Significant potential advances in emotion and cognition theory hinge on the development
Domain Theory
 Handbook of Logic in Computer Science
, 1994
"... Least fixpoints as meanings of recursive definitions. ..."
Abstract

Cited by 546 (25 self)
 Add to MetaCart
Least fixpoints as meanings of recursive definitions.
Information Theory and Statistics
, 1968
"... Entropy and relative entropy are proposed as features extracted from symbol sequences. Firstly, a proper Iterated Function System is driven by the sequence, producing a fractaMike representation (CSR) with a low computational cost. Then, two entropic measures are applied to the CSR histogram of th ..."
Abstract

Cited by 1761 (2 self)
 Add to MetaCart
Entropy and relative entropy are proposed as features extracted from symbol sequences. Firstly, a proper Iterated Function System is driven by the sequence, producing a fractaMike representation (CSR) with a low computational cost. Then, two entropic measures are applied to the CSR histogram
Results 1  10
of
1,651,297