Results 1  10
of
69
Thresholding of statistical maps in functional neuroimaging using the false discovery rate.
 NeuroImage
, 2002
"... Finding objective and effective thresholds for voxelwise statistics derived from neuroimaging data has been a longstanding problem. With at least one test performed for every voxel in an image, some correction of the thresholds is needed to control the error rates, but standard procedures for mult ..."
Abstract

Cited by 521 (9 self)
 Add to MetaCart
Finding objective and effective thresholds for voxelwise statistics derived from neuroimaging data has been a longstanding problem. With at least one test performed for every voxel in an image, some correction of the thresholds is needed to control the error rates, but standard procedures
Automated Manifold Surgery: Constructing Geometrically Accurate and Topologically Correct Models of the Human Cerebral Cortex
, 2001
"... Highly accurate surface models of the cerebral cortex are becoming increasingly important as tools in the investigation of the functional organization of the human brain. The construction of such models is difficult using current neuroimaging technology due to the high degree of cortical folding. E ..."
Abstract

Cited by 167 (25 self)
 Add to MetaCart
Highly accurate surface models of the cerebral cortex are becoming increasingly important as tools in the investigation of the functional organization of the human brain. The construction of such models is difficult using current neuroimaging technology due to the high degree of cortical folding
Empirical and Theoretical FDR Analyses for fMRI Data
"... The multiple comparisons problems encountered in statistical analysis of functional neuroimaging data are well known. As an alternative to conservative methods for Family Wise Error Rate correction (e.g., Random Field Theory (RFT), Bonferonni tests), procedures that control the False Discovery Rate ..."
Abstract
 Add to MetaCart
The multiple comparisons problems encountered in statistical analysis of functional neuroimaging data are well known. As an alternative to conservative methods for Family Wise Error Rate correction (e.g., Random Field Theory (RFT), Bonferonni tests), procedures that control the False Discovery Rate
Verifying EndtoEnd Protocols Using Induction with CSP/FDR
 In Proc. of IPPS/SPDP Workshop on Parallel and Distributed Processing, LNCS 1586
, 1999
"... We investigate a technique, suitable for process algebraic, finitestate machine (modelchecking) automated tools, for formally modelling arbitrary network topologies. We model aspects of a protocol for multiservice networks, and demonstrate how the technique can be used to verify endtoend propert ..."
Abstract

Cited by 14 (9 self)
 Add to MetaCart
We investigate a technique, suitable for process algebraic, finitestate machine (modelchecking) automated tools, for formally modelling arbitrary network topologies. We model aspects of a protocol for multiservice networks, and demonstrate how the technique can be used to verify end
Automated Formal Analysis of Networks: FDR Models of Arbitrary Topologies and FlowControl Mechanisms
, 1998
"... . We present new techniques for formally modeling arbitrary network topologies and controlflow schemes, applicable to highspeed networks. A novel induction technique suitable for process algebraic, finitestate machine techniques is described which can be used to verify endtoend properties o ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
. We present new techniques for formally modeling arbitrary network topologies and controlflow schemes, applicable to highspeed networks. A novel induction technique suitable for process algebraic, finitestate machine techniques is described which can be used to verify endtoend properties
Verifying an infinite family of inductions simultaneously using data independence and FDR
, 1999
"... We present a technique for formally establishing results for scalable systems, such as distributed systems and communication protocol networks, where the results are independent of the system's parameters. Example parameters are network topology, size and buffer capacity. The technique combines ..."
Abstract

Cited by 8 (5 self)
 Add to MetaCart
We present a technique for formally establishing results for scalable systems, such as distributed systems and communication protocol networks, where the results are independent of the system's parameters. Example parameters are network topology, size and buffer capacity. The technique
Single Ended Loop Topology Estimation using FDR and Correlation TDR in a DSL Modem
"... Abstract — The broadband capability of a DSL is dependant on the copper access network. Single Ended Loop Testing (SELT) is the most preferred and economical way in estimating the copper loop topology. The combined use of complementary code based Correlation Time Domain Reflectometry (CTDR) and Freq ..."
Abstract
 Add to MetaCart
) and Frequency Domain Reflectometry (FDR) for accurate loop topology estimation is presented in this paper. The advantage of the proposed method is that the measurement is done by reusing most of the firmware modules in a typical DSL broadband modem without affecting other pairs in the bundle. Since
Disrupted smallworld networks in schizophrenia
 Brain, 131 (Pt
, 2008
"... The human brain has been described as a large, sparse, complex network characterized by efficient smallworld properties, which assure that the brain generates and integrates informationwith high efficiency.Many previous neuroimaging studies have provided consistent evidence of ‘dysfunctional connec ..."
Abstract

Cited by 95 (9 self)
 Add to MetaCart
The human brain has been described as a large, sparse, complex network characterized by efficient smallworld properties, which assure that the brain generates and integrates informationwith high efficiency.Many previous neuroimaging studies have provided consistent evidence of ‘dysfunctional
Formal Verification of Arbitrary Network Topologies
"... We show how data independence results can be used to generalise an inductive proof from binary to arbitrary branching tree networks. The example used is modelled on the RSVP Resource Reservation Protocol. Of particular interest is the need for a separate lowerlevel induction which is itself closely ..."
Abstract

Cited by 8 (2 self)
 Add to MetaCart
closely tied to data independence. The inductions combine the use of the process algebra CSP to model systems and their specifications, and the FDR tool to discharge the various proof obligations.
© Hindawi Publishing Corp. BOUNDARY VALUE PROBLEM FOR r 2d2f/dr 2+f = f 3 (I): EXISTENCE AND UNIQUENESS
, 1999
"... Abstract. We study the equation r2d2f/dr2 + f = f 3 with the boundary conditions f(1) = 0, f(∞) = 1, and f(r)> 0 for 1< r <∞. The existence of the solution is proved using a topological shooting argument. And the uniqueness is proved by a variation method. 2000 Mathematics Subject Classifi ..."
Abstract
 Add to MetaCart
Abstract. We study the equation r2d2f/dr2 + f = f 3 with the boundary conditions f(1) = 0, f(∞) = 1, and f(r)> 0 for 1< r <∞. The existence of the solution is proved using a topological shooting argument. And the uniqueness is proved by a variation method. 2000 Mathematics Subject
Results 1  10
of
69