Results 1  10
of
2,391,394
A new modelindependent way of extracting Vub/Vcb
, 2002
"... The ratio between the photon spectrum in B → Xsγ and the differential semileptonic rate wrt the hadronic variable MX/EX is a shortdistance quantity calculable in perturbation theory and independent of the Fermi motion of the b quark in the B meson. We present a NLO analysis of this ratio and show h ..."
Abstract
 Add to MetaCart
how it can be used to determine Vub/Vcb  independently of any model for the shape function. We also discuss how this relation can be used to test the validity of the shapefunction theory on the data. 1
Modelindependent WIMP Searches at the ILC
, 709
"... We investigate the possibility to detect WIMPs at the ILC in a modelindependent way using events with single photons. The study is done with a full detector simulation of the LDC detector and MarlinReco. It turns out that WIMPs are observable this way at the ILC if their coupling to electrons is no ..."
Abstract
 Add to MetaCart
We investigate the possibility to detect WIMPs at the ILC in a modelindependent way using events with single photons. The study is done with a full detector simulation of the LDC detector and MarlinReco. It turns out that WIMPs are observable this way at the ILC if their coupling to electrons
PseudoRandom Generation from OneWay Functions
 PROC. 20TH STOC
, 1988
"... Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show howto construct a pseudorandom generator from any oneway function. Since it is easy to construct a oneway function from a pseudorandom generator, this result shows that there is a pseudorandom gene ..."
Abstract

Cited by 887 (22 self)
 Add to MetaCart
Pseudorandom generators are fundamental to many theoretical and applied aspects of computing. We show howto construct a pseudorandom generator from any oneway function. Since it is easy to construct a oneway function from a pseudorandom generator, this result shows that there is a pseudorandom
Modelindependent
, 2003
"... low momentum nucleon interaction from phase shift equivalence S.K. Bogner a,b 1, T.T.S. Kuo b 2 c,b 3 ..."
Abstract
 Add to MetaCart
low momentum nucleon interaction from phase shift equivalence S.K. Bogner a,b 1, T.T.S. Kuo b 2 c,b 3
Quarkonium Formation Time in a ModelIndependent Approach
, 1999
"... We use dispersion relations to reconstruct, in a model–independent way, the formation dynamics of heavy quarkonium from the experimental data on e + e − → ¯ QQ annihilation. We extract a distribution of formation times with a mean value for the J/ψ, < τ J/ψ> = 0.44 fm; and for the Υ, < τΥ ..."
Abstract
 Add to MetaCart
We use dispersion relations to reconstruct, in a model–independent way, the formation dynamics of heavy quarkonium from the experimental data on e + e − → ¯ QQ annihilation. We extract a distribution of formation times with a mean value for the J/ψ, < τ J/ψ> = 0.44 fm; and for the Υ, < τ
Training Products of Experts by Minimizing Contrastive Divergence
, 2002
"... It is possible to combine multiple latentvariable models of the same data by multiplying their probability distributions together and then renormalizing. This way of combining individual “expert ” models makes it hard to generate samples from the combined model but easy to infer the values of the l ..."
Abstract

Cited by 829 (79 self)
 Add to MetaCart
It is possible to combine multiple latentvariable models of the same data by multiplying their probability distributions together and then renormalizing. This way of combining individual “expert ” models makes it hard to generate samples from the combined model but easy to infer the values
An intrusiondetection model
 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a realtime intrusiondetection expert system capable of detecting breakins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract

Cited by 632 (0 self)
 Add to MetaCart
of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular
Evaluating the Accuracy of SamplingBased Approaches to the Calculation of Posterior Moments
 IN BAYESIAN STATISTICS
, 1992
"... Data augmentation and Gibbs sampling are two closely related, samplingbased approaches to the calculation of posterior moments. The fact that each produces a sample whose constituents are neither independent nor identically distributed complicates the assessment of convergence and numerical accurac ..."
Abstract

Cited by 583 (14 self)
 Add to MetaCart
Data augmentation and Gibbs sampling are two closely related, samplingbased approaches to the calculation of posterior moments. The fact that each produces a sample whose constituents are neither independent nor identically distributed complicates the assessment of convergence and numerical
Indivisible labor and the business cycle
 Journal of Monetary Economics
, 1985
"... A growth model with shocks to technology is studied. Labor is indivisible, so all variability in hours worked is due to fluctuations in the number employed. We find that, unlike previous equilibrium models of the business cycle, this economy displays large fluctuations in hours worked and relatively ..."
Abstract

Cited by 793 (10 self)
 Add to MetaCart
A growth model with shocks to technology is studied. Labor is indivisible, so all variability in hours worked is due to fluctuations in the number employed. We find that, unlike previous equilibrium models of the business cycle, this economy displays large fluctuations in hours worked
Results 1  10
of
2,391,394