Results 1 - 10
of
1,938
On the optimality of the simple Bayesian classifier under zero-one loss
- MACHINE LEARNING
, 1997
"... The simple Bayesian classifier is known to be optimal when attributes are independent given the class, but the question of whether other sufficient conditions for its optimality exist has so far not been explored. Empirical results showing that it performs surprisingly well in many domains containin ..."
Abstract
-
Cited by 818 (27 self)
- Add to MetaCart
containing clear attribute dependences suggest that the answer to this question may be positive. This article shows that, although the Bayesian classifier’s probability estimates are only optimal under quadratic loss if the independence assumption holds, the classifier itself can be optimal under zero
The Ponder Policy Specification Language
- LECTURE NOTES IN COMPUTER SCIENCE
, 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract
-
Cited by 499 (28 self)
- Add to MetaCart
of networks and distributed systems. Ponder can also be used for security management activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. Key concepts of the language include roles to group policies relating to a position
Monopolistic competition and optimum product diversity. The American Economic Review,
, 1977
"... The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper is c ..."
Abstract
-
Cited by 1911 (5 self)
- Add to MetaCart
. Such an optimum can be realized in a market if perfectly discriminatory pricing is possible. Otherwise we face conflicting problems. A competitive market fulfilling the marginal condition would be unsustainable because total profits would be negative. An element of monopoly would allow positive profits, but would
Genomic control for association studies
, 1999
"... A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders. ..."
Abstract
-
Cited by 480 (13 self)
- Add to MetaCart
. To achieve this goal, we propose a statistical method that has several optimal properties: It can be used with casecontrol data and yet, like family-based designs, controls for population heterogeneity; it is insensitive to the usual violations of model assumptions, such as cases failing to be strictly
Temporal correlator in YM 2 3 and reflection-positivity violation
, 2004
"... Abstract. We consider numerical data for the lattice Landau gluon propagator obtained at very large lattice volumes in three-dimensional pure SU(2) Yang-Mills gauge theory (YM2 3). We find that the temporal correlator C(t) shows an oscillatory pattern and is negative for several values of t. This is ..."
Abstract
- Add to MetaCart
. This is an explicit violation of reflection positivity and can be related to gluon confinement. We also obtain a good fit for this quantity in the whole time interval using a sum of Stingl-like propagators.
Scene perception: detecting and judging objects undergoing relational violations
, 1982
"... Five classes of relations between an object and its setting can characterize the organization of objects into real-world scenes. The relations are (1) Interposition (objects interrupt their background), (2) Support (objects tend to rest on surfaces), (3) Probability (objects tend to be found in some ..."
Abstract
-
Cited by 222 (4 self)
- Add to MetaCart
) be in an inappropriate position, and (5) be too large or too small relative to the other objects in the scene. In Experiment I, subjects attempted to determine whether the cued object corresponded to a target object which had been specified in advance by name. With the exception of the Interposition violation, violation
Decision field theory: A dynamic-cognitive approach to decision making (Tech
, 1989
"... Decision field theory provides for a mathematical foundation leading to a dynamic, stochastic theory of decision behavior in an uncertain environment. This theory is used to explain (a) viola-tions of stochastic dominance, (b) violations of strong stochastic transitivity, (c) violations of inde-pend ..."
Abstract
-
Cited by 264 (14 self)
- Add to MetaCart
Decision field theory provides for a mathematical foundation leading to a dynamic, stochastic theory of decision behavior in an uncertain environment. This theory is used to explain (a) viola-tions of stochastic dominance, (b) violations of strong stochastic transitivity, (c) violations of inde
Evidence for terror management theory: I. The effects of mortality salience on reactions to those who violate or uphold cultural values
- Journal of Personality and Social Psychology
, 1989
"... On the basis of terror management theory, it was hypothesized that when mortality is made salient, Ss would respond especially positively toward those who uphold cultural values and especially nega-tively toward those who violate cultural values. In Experiment I, judges recommended especially harsh ..."
Abstract
-
Cited by 162 (25 self)
- Add to MetaCart
On the basis of terror management theory, it was hypothesized that when mortality is made salient, Ss would respond especially positively toward those who uphold cultural values and especially nega-tively toward those who violate cultural values. In Experiment I, judges recommended especially harsh
Covariant operator formalism of gauge theories and quantum gravity,” World Sci. Lect. Notes Phys
, 1990
"... The new method proposed previously for solving the covariant operator formalism of quantum Einstein gravity is applied to quantum electrodynamics as an exercise of the application to quantum chromodynamics. The purposes of doing this are to establish the details of the method and to reconfirm the va ..."
Abstract
-
Cited by 214 (5 self)
- Add to MetaCart
the validity of the method. The Wightman functions are explicitly constructed, at tree and one-loop levels, so as to be consistent with four-dimensional multiple (anti)commutators and with the energy-positivity condition. Quantum chromodynamics is a non-abelian gauge theory, for which the covariant operator
Abrupt visual onsets and selective attention: Voluntary versus automatic allocation
- Journal of Experimental Psychology: Human Perception and Performance
, 1990
"... The hypothesis that abrupt visual onsets capture attention automatically, as suggested by Yantis and Jonides (1984) was tested in four experiments. A centrally located cue directed attention to one of several stimulus positions in preparation for the identification of a target letter embedded in an ..."
Abstract
-
Cited by 213 (3 self)
- Add to MetaCart
The hypothesis that abrupt visual onsets capture attention automatically, as suggested by Yantis and Jonides (1984) was tested in four experiments. A centrally located cue directed attention to one of several stimulus positions in preparation for the identification of a target letter embedded
Results 1 - 10
of
1,938