• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 654
Next 10 →

Constructing Free Energy Approximations and Generalized Belief Propagation Algorithms

by Jonathan S. Yedidia, William T. Freeman, Yair Weiss - IEEE Transactions on Information Theory , 2005
"... Important inference problems in statistical physics, computer vision, error-correcting coding theory, and artificial intelligence can all be reformulated as the computation of marginal probabilities on factor graphs. The belief propagation (BP) algorithm is an efficient way to solve these problems t ..."
Abstract - Cited by 585 (13 self) - Add to MetaCart
the Bethe approximation, and corresponding generalized belief propagation (GBP) algorithms. We emphasize the conditions a free energy approximation must satisfy in order to be a “valid ” or “maxent-normal ” approximation. We describe the relationship between four different methods that can be used

Estimating standard errors in finance panel data sets: comparing approaches.

by Mitchell A Petersen - Review of Financial Studies , 2009
"... Abstract In both corporate finance and asset pricing empirical work, researchers are often confronted with panel data. In these data sets, the residuals may be correlated across firms and across time, and OLS standard errors can be biased. Historically, the two literatures have used different solut ..."
Abstract - Cited by 890 (7 self) - Add to MetaCart
solutions to this problem. Corporate finance has relied on clustered standard errors, while asset pricing has used the Fama-MacBeth procedure to estimate standard errors. This paper examines the different methods used in the literature and explains when the different methods yield the same (and correct

How algebraic Bethe ansatz works for integrable model

by L. D. Faddeev - In: Symétries quantiques (Les Houches , 1996
"... In my Les–Houches lectures of 1982 I described the inverse scattering method of solving the integrable field–theoretical models in 1+1 dimensional space–time. Both classical case, stemming from the famous paper by Gardner, Green, Kruskal and Miura of 1967 on KdV equation, and its quantum counterpart ..."
Abstract - Cited by 270 (4 self) - Add to MetaCart
In my Les–Houches lectures of 1982 I described the inverse scattering method of solving the integrable field–theoretical models in 1+1 dimensional space–time. Both classical case, stemming from the famous paper by Gardner, Green, Kruskal and Miura of 1967 on KdV equation, and its quantum

The Bethe Ansatz

by L. D. Faddeev, Silviu Borac, Georg Juttner, Klaus Jung, Christian Kreft, Nadja Kutz, Martin Schmidt
"... For many years the structure of 1+1 dimensional systems (one space + one time dimension) has been of great interest for mathematical physics. The Bethe Ansatz is a unifying method connecting a wide range of different problems in these areas. It has been applied to magnetic chains in solid state phys ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
For many years the structure of 1+1 dimensional systems (one space + one time dimension) has been of great interest for mathematical physics. The Bethe Ansatz is a unifying method connecting a wide range of different problems in these areas. It has been applied to magnetic chains in solid state

, Beth Shapiro

by Sergei L. Kosakovsky Pond, Alexei J. Drummond, Oliver G. Pybus, Nuno Taveira, Andrew Rambaut
"... Upon HIV transmission, some patients develop AIDS in only a few months, while others remain disease free for 20 or more years. This variation in the rate of disease progression is poorly understood and has been attributed to host genetics, host immune responses, co-infection, viral genetics, and ada ..."
Abstract - Add to MetaCart
, and adaptation. Here, we develop a new ‘‘relaxed-clock’’ phylogenetic method to estimate absolute rates of synonymous and nonsynonymous substitution through time. We identify an unexpected association between the synonymous substitution rate of HIV and disease progression parameters. Since immune activation

Capability Maturity Model . . .

by Mark C. Paulk, Mark C. Paulk, Bill Curtis, Bill Curtis, Mary Beth Chrissis, Mary Beth Chrissis, Charles V. Weber, Charles V. Weber, Thomas R. Miller, Lt Col , 1993
"... (maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500 Standard Form 298 ..."
Abstract - Cited by 253 (5 self) - Add to MetaCart
(Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102 Capability Maturity Model SM for Software, Version 1.1 Mark C. Paulk, Bill Curtis, Mary Beth Chrissis, Charles V. Weber In November 1986, the Software Engineering Institute (SEI), with assistance from the Mitre Corporation, began developing a process

Valuation of Trust in Open Networks

by Thomas Beth, Malte Borcherding, Birgit Klein , 1994
"... . Authentication in open networks usually requires participation of trusted entities. Many protocols allow trust to be obtained by recommendation of other entities whose recommendations are known to be reliable. To consider an entity as being trustworthy, especially if there have been several mediat ..."
Abstract - Cited by 235 (0 self) - Add to MetaCart
mediators or contradicting recommendations, it is necessary to have a means of estimating its trustworthiness. In this paper we present a method for the valuation of trustworthiness which can be used to accept or reject an entity as being suitable for sensitive tasks. It constitutes an extension of the work

Complexity of Bethe approximation

by Jinwoo Shin - In Artificial Intelligence and Statistics , 2012
"... This paper resolves a common complexity issue in the Bethe approximation of statistical physics and the sum-product Belief Propagation (BP) algorithm of artificial intelligence. The Bethe approximation reduces the problem of computing the partition function in a graphical model to that of solving a ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
set of non-linear equations, so-called the Bethe equation. On the other hand, the BP algorithm is a popular heuristic method for estimating marginal distribution in a graphical model. Although they are inspired and developed from different directions, Yedidia, Freeman and Weiss (2004) established a

Approximating the Bethe partition function

by Adrian Weller, Tony Jebara
"... When belief propagation (BP) converges, it does so to a stationary point of the Bethe free energy F, and is often strikingly accurate. However, it may converge only to a local optimum or may not converge at all. An algorithm was recently introduced by Weller and Jebara for attractive binary pairwise ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
better performance and, for attractive models, yields a fully polynomial-time approximation scheme (FPTAS) without any degree restriction. Further, our methods apply to general (nonattractive) models, though with no polynomial time guarantee in this case, demonstrating that approximating log of the Bethe

Hirota equation and Bethe ansatz

by A. Zabrodin , 1998
"... The paper is a review of recent works devoted to analysis of classical integrable structures in quantum integrable models solved by one or another version of the Bethe ansatz. Similarities between elements of the quantum and classical theories of integrable systems are discussed. Some key notions of ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
The paper is a review of recent works devoted to analysis of classical integrable structures in quantum integrable models solved by one or another version of the Bethe ansatz. Similarities between elements of the quantum and classical theories of integrable systems are discussed. Some key notions
Next 10 →
Results 1 - 10 of 654
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University