Results 1 - 10
of
16,384
Mean shift: A robust approach toward feature space analysis
- In PAMI
, 2002
"... A general nonparametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure, the mean shift. We prove for discrete data the convergence ..."
Abstract
-
Cited by 2395 (37 self)
- Add to MetaCart
the convergence of a recursive mean shift procedure to the nearest stationary point of the underlying density function and thus its utility in detecting the modes of the density. The equivalence of the mean shift procedure to the Nadaraya–Watson estimator from kernel regression and the robust M
Back to Bentham? Explorations of Experienced Utility
- QUARTERLY JOURNAL OF ECONOMICS
, 1997
"... Two core meanings of “utility” are distinguished. “Decision utility” is the weight of an outcome in a decision. “Experienced utility” is hedonic quality, as in Bentham’s usage. Experienced utility can be reported in real time (instant utility), or in retrospective evaluations of past episodes (remem ..."
Abstract
-
Cited by 429 (28 self)
- Add to MetaCart
Two core meanings of “utility” are distinguished. “Decision utility” is the weight of an outcome in a decision. “Experienced utility” is hedonic quality, as in Bentham’s usage. Experienced utility can be reported in real time (instant utility), or in retrospective evaluations of past episodes
Formalising trust as a computational concept
, 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract
-
Cited by 529 (6 self)
- Add to MetaCart
Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean
MULTILISP: a language for concurrent symbolic computation
- ACM Transactions on Programming Languages and Systems
, 1985
"... Multilisp is a version of the Lisp dialect Scheme extended with constructs for parallel execution. Like Scheme, Multilisp is oriented toward symbolic computation. Unlike some parallel programming languages, Multilisp incorporates constructs for causing side effects and for explicitly introducing par ..."
Abstract
-
Cited by 529 (1 self)
- Add to MetaCart
prototypes including up to eight processors. Concert Multilisp uses novel techniques for task scheduling and garbage collection. The task scheduler helps control excessive resource utilization by means of an unfair scheduling policy; the garbage collector uses a multiprocessor algorithm based
Proposed NIST Standard for Role-Based Access Control
, 2001
"... In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative def ..."
Abstract
-
Cited by 544 (13 self)
- Add to MetaCart
definition of RBAC exists today. This lack of a widely accepted model results in uncertainty and confusion about RBAC's utility and meaning. The standard proposed here seeks to resolve this situation by unifying ideas from a base of frequently referenced RBAC models, commercial products, and research
Monopolistic competition and optimum product diversity. The American Economic Review,
, 1977
"... The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper is c ..."
Abstract
-
Cited by 1911 (5 self)
- Add to MetaCart
constant marginal cost. Modeling the desirability of variety has been thought to be difficult, and several indirect approaches have been adopted. The Hotelling spatial model, Lancaster's product characteristics approach, and the mean-variance portfolio selection model have all been put to use.3
The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 85 years of research findings
- Psychological Bulletin
, 1998
"... This article summarizes the practical and theoretical implications of 85 years of research in personnel selection. On the basis of meta-analytic findings, this article presents the validity of 19 selection procedures for predicting job performance and training performance and the validity of paired ..."
Abstract
-
Cited by 392 (2 self)
- Add to MetaCart
combinations of general mental ability (GMA) and Ihe 18 other selection procedures. Overall, the 3 combinations with the highest multivariate validity and utility for job performance were GMA plus a work sample test (mean validity of.63), GMA plus an integrity test (mean validity of.65), and GMA plus a
Software transactional memory for dynamic-sized data structures
- IN PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING
, 2003
"... We propose a new form of software transactional memory (STM) designed to support dynamic-sized data structures, and we describe a novel non-blocking implementation. The non-blocking property we consider is obstruction-freedom. Obstruction-freedom is weaker than lock-freedom; as a result, it admits s ..."
Abstract
-
Cited by 432 (25 self)
- Add to MetaCart
substantially simpler and more efficient implementations. A novel feature of our obstruction-free STM implementation is its use of modular contention managers to ensure progress in practice. We illustrate the utility of our dynamic STM with a straightforward implementation of an obstruction-free red-black tree
Confidence intervals for the normal mean utilizing prior information
, 709
"... Abstract: We consider X1, X2,..., Xn that are independent and identically N(µ, σ 2) distributed random variables. Suppose that the parameter of interest is µ and also suppose that we have uncertain prior information that µ/σ is close to 0. Our aim is to find a frequentist 1 − α confidence interval f ..."
Abstract
-
Cited by 10 (10 self)
- Add to MetaCart
for µ that utilizes this prior information. Pratt and Brown, Casella and Hwang have described such confidence intervals for the cases that σ 2 is known and that σ 2 is unknown respectively. These confidence intervals have the major problem that if the prior information happens to be badly incorrect (i
End-to-end available bandwidth: Measurement methodology, dynamics, and relation with TCP throughput
- In Proceedings of ACM SIGCOMM
, 2002
"... The available bandwidth (avail-bw) in a network path is of major importance in congestion control, streaming applications, QoS verification, server selection, and overlay networks. We describe an end-to-end methodology, called Self-Loading Periodic Streams (SLoPS), for measuring avail-bw. The basic ..."
Abstract
-
Cited by 414 (20 self)
- Add to MetaCart
paths. Pathload is non-intrusive, meaning that it does not cause significant increases in the network utilization, delays, or losses. We used pathload to evaluate the variability (‘dynamics’) of the avail-bw in some paths that cross USA and Europe. The avail-bw becomes significantly more variable
Results 1 - 10
of
16,384