• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,938
Next 10 →

On the optimality of the simple Bayesian classifier under zero-one loss

by Pedro Domingos, Michael Pazzani - MACHINE LEARNING , 1997
"... The simple Bayesian classifier is known to be optimal when attributes are independent given the class, but the question of whether other sufficient conditions for its optimality exist has so far not been explored. Empirical results showing that it performs surprisingly well in many domains containin ..."
Abstract - Cited by 818 (27 self) - Add to MetaCart
containing clear attribute dependences suggest that the answer to this question may be positive. This article shows that, although the Bayesian classifier’s probability estimates are only optimal under quadratic loss if the independence assumption holds, the classifier itself can be optimal under zero

The Ponder Policy Specification Language

by Nicodemos Damianou , Naranker Dulay , Emil Lupu , Morris Sloman - LECTURE NOTES IN COMPUTER SCIENCE , 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract - Cited by 499 (28 self) - Add to MetaCart
of networks and distributed systems. Ponder can also be used for security management activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. Key concepts of the language include roles to group policies relating to a position

Monopolistic competition and optimum product diversity. The American Economic Review,

by Avinash K Dixit , Joseph E Stiglitz , Harold Hotelling , Nicholas Stern , Kelvin Lancaster , Stiglitz , 1977
"... The basic issue concerning production in welfare economics is whether a market solution will yield the socially optimum kinds and quantities of commodities. It is well known that problems can arise for three broad reasons: distributive justice; external effects; and scale economies. This paper is c ..."
Abstract - Cited by 1911 (5 self) - Add to MetaCart
. Such an optimum can be realized in a market if perfectly discriminatory pricing is possible. Otherwise we face conflicting problems. A competitive market fulfilling the marginal condition would be unsustainable because total profits would be negative. An element of monopoly would allow positive profits, but would

Genomic control for association studies

by B. Devlin, Kathryn Roeder , 1999
"... A dense set of single nucleotide polymorphisms (SNP) covering the genome and an efficient method to assess SNP genotypes are expected to be available in the near future. An outstanding question is how to use these technologies efficiently to identify genes affecting liability to complex disorders. ..."
Abstract - Cited by 480 (13 self) - Add to MetaCart
. To achieve this goal, we propose a statistical method that has several optimal properties: It can be used with casecontrol data and yet, like family-based designs, controls for population heterogeneity; it is insensitive to the usual violations of model assumptions, such as cases failing to be strictly

Temporal correlator in YM 2 3 and reflection-positivity violation

by A. R. Taurines, A. Cucchieri, T. Mendes , 2004
"... Abstract. We consider numerical data for the lattice Landau gluon propagator obtained at very large lattice volumes in three-dimensional pure SU(2) Yang-Mills gauge theory (YM2 3). We find that the temporal correlator C(t) shows an oscillatory pattern and is negative for several values of t. This is ..."
Abstract - Add to MetaCart
. This is an explicit violation of reflection positivity and can be related to gluon confinement. We also obtain a good fit for this quantity in the whole time interval using a sum of Stingl-like propagators.

Scene perception: detecting and judging objects undergoing relational violations

by Irving Biederman, Robert J. Mezzanotte, Jan, C. Rabinowitz , 1982
"... Five classes of relations between an object and its setting can characterize the organization of objects into real-world scenes. The relations are (1) Interposition (objects interrupt their background), (2) Support (objects tend to rest on surfaces), (3) Probability (objects tend to be found in some ..."
Abstract - Cited by 222 (4 self) - Add to MetaCart
) be in an inappropriate position, and (5) be too large or too small relative to the other objects in the scene. In Experiment I, subjects attempted to determine whether the cued object corresponded to a target object which had been specified in advance by name. With the exception of the Interposition violation, violation

Decision field theory: A dynamic-cognitive approach to decision making (Tech

by Jerome R. Busemeyer, James T. Townsend , 1989
"... Decision field theory provides for a mathematical foundation leading to a dynamic, stochastic theory of decision behavior in an uncertain environment. This theory is used to explain (a) viola-tions of stochastic dominance, (b) violations of strong stochastic transitivity, (c) violations of inde-pend ..."
Abstract - Cited by 264 (14 self) - Add to MetaCart
Decision field theory provides for a mathematical foundation leading to a dynamic, stochastic theory of decision behavior in an uncertain environment. This theory is used to explain (a) viola-tions of stochastic dominance, (b) violations of strong stochastic transitivity, (c) violations of inde

Evidence for terror management theory: I. The effects of mortality salience on reactions to those who violate or uphold cultural values

by Abram Rosenblatt, Jeff Greenberg, Sheldon Solomon, Tom Pyszczynski, Deborah Lyon - Journal of Personality and Social Psychology , 1989
"... On the basis of terror management theory, it was hypothesized that when mortality is made salient, Ss would respond especially positively toward those who uphold cultural values and especially nega-tively toward those who violate cultural values. In Experiment I, judges recommended especially harsh ..."
Abstract - Cited by 162 (25 self) - Add to MetaCart
On the basis of terror management theory, it was hypothesized that when mortality is made salient, Ss would respond especially positively toward those who uphold cultural values and especially nega-tively toward those who violate cultural values. In Experiment I, judges recommended especially harsh

Covariant operator formalism of gauge theories and quantum gravity,” World Sci. Lect. Notes Phys

by Mitsuo Abe, Noboru Nakanishi , 1990
"... The new method proposed previously for solving the covariant operator formalism of quantum Einstein gravity is applied to quantum electrodynamics as an exercise of the application to quantum chromodynamics. The purposes of doing this are to establish the details of the method and to reconfirm the va ..."
Abstract - Cited by 214 (5 self) - Add to MetaCart
the validity of the method. The Wightman functions are explicitly constructed, at tree and one-loop levels, so as to be consistent with four-dimensional multiple (anti)commutators and with the energy-positivity condition. Quantum chromodynamics is a non-abelian gauge theory, for which the covariant operator

Abrupt visual onsets and selective attention: Voluntary versus automatic allocation

by Steven Yantis, John Jonides - Journal of Experimental Psychology: Human Perception and Performance , 1990
"... The hypothesis that abrupt visual onsets capture attention automatically, as suggested by Yantis and Jonides (1984) was tested in four experiments. A centrally located cue directed attention to one of several stimulus positions in preparation for the identification of a target letter embedded in an ..."
Abstract - Cited by 213 (3 self) - Add to MetaCart
The hypothesis that abrupt visual onsets capture attention automatically, as suggested by Yantis and Jonides (1984) was tested in four experiments. A centrally located cue directed attention to one of several stimulus positions in preparation for the identification of a target letter embedded
Next 10 →
Results 1 - 10 of 1,938
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University