• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16,090
Next 10 →

Symbolic Model Checking: 10^20 States and Beyond

by J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, L. J. Hwang , 1992
"... Many different methods have been devised for automatically verifying finite state systems by examining state-graph models of system behavior. These methods all depend on decision procedures that explicitly represent the state space using a list or a table that grows in proportion to the number of st ..."
Abstract - Cited by 758 (41 self) - Add to MetaCart
Binary Decision Diagrams (Bryant, R. E., 1986, IEEE Trans. Comput. C-35) to represent relations and formulas. We then show how our new Mu-Calculus model checking algorithm can be used to derive efficient decision procedures for CTL model checking, satistiability of linear-time temporal logic formulas

A comparison of event models for Naive Bayes text classification

by Andrew McCallum, Kamal Nigam , 1998
"... Recent work in text classification has used two different first-order probabilistic models for classification, both of which make the naive Bayes assumption. Some use a multi-variate Bernoulli model, that is, a Bayesian Network with no dependencies between words and binary word features (e.g. Larkey ..."
Abstract - Cited by 1025 (26 self) - Add to MetaCart
Recent work in text classification has used two different first-order probabilistic models for classification, both of which make the naive Bayes assumption. Some use a multi-variate Bernoulli model, that is, a Bayesian Network with no dependencies between words and binary word features (e

Binary models for marginal independence

by Mathias Drton, Thomas S. Richardson - JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B , 2005
"... A number of authors have considered multivariate Gaussian models for marginal independence. In this paper we develop models for binary data with the same independence structure. The models can be parameterized based on Möbius inversion and maximum likelihood estimation can be performed using a versi ..."
Abstract - Cited by 25 (3 self) - Add to MetaCart
A number of authors have considered multivariate Gaussian models for marginal independence. In this paper we develop models for binary data with the same independence structure. The models can be parameterized based on Möbius inversion and maximum likelihood estimation can be performed using a

Metabolic stability and epigenesis in randomly connected nets

by S. A. Kauffman - Journal of Theoretical Biology , 1969
"... “The world is either the effect of cause or chance. If the latter, it is a world for all that, that is to say, it is a regular and beautiful structure.” Marcus Aurelius Proto-organisms probably were randomly aggregated nets of chemical reactions. The hypothesis that contemporary organisms are also r ..."
Abstract - Cited by 657 (5 self) - Add to MetaCart
randomly constructed molecular automata is examined by modeling the gene as a binary (on-off) device and studying the behavior of large, randomly con-structed nets of these binary “genes”. The results suggest that, if each “gene ” is directly affected by two or three other “genes”, then such random nets

Comparing Images Using the Hausdorff Distance

by Daniel P. Huttenlocher, Gregory A. Klanderman, William J. Rucklidge - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1993
"... The Hausdorff distance measures the extent to which each point of a `model' set lies near some point of an `image' set and vice versa. Thus this distance can be used to determine the degree of resemblance between two objects that are superimposed on one another. In this paper we provide ef ..."
Abstract - Cited by 659 (10 self) - Add to MetaCart
efficient algorithms for computing the Hausdorff distance between all possible relative positions of a binary image and a model. We focus primarily on the case in which the model is only allowed to translate with respect to the image. Then we consider how to extend the techniques to rigid motion

Performance Analysis of the IEEE 802.11 Distributed Coordination Function

by Giuseppe Bianchi , 2000
"... Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slott ..."
Abstract - Cited by 1869 (1 self) - Add to MetaCart
Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary

Unsupervised Learning by Probabilistic Latent Semantic Analysis

by Thomas Hofmann - Machine Learning , 2001
"... Abstract. This paper presents a novel statistical method for factor analysis of binary and count data which is closely related to a technique known as Latent Semantic Analysis. In contrast to the latter method which stems from linear algebra and performs a Singular Value Decomposition of co-occurren ..."
Abstract - Cited by 618 (4 self) - Add to MetaCart
Abstract. This paper presents a novel statistical method for factor analysis of binary and count data which is closely related to a technique known as Latent Semantic Analysis. In contrast to the latter method which stems from linear algebra and performs a Singular Value Decomposition of co

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
the convergence the more exact the approximation. • If the hidden nodes are binary, then thresholding the loopy beliefs is guaranteed to give the most probable assignment, even though the numerical value of the beliefs may be incorrect. This result only holds for nodes in the loop. In the max-product (or "

Foreign aid Binary model

by Sarantis Kalyvitis A, Irene Vlachaki A
"... Foreign aid flows have increased considerably during the last decades, targeting, apart from development objectives, goals related to democracy. In this paper we investigate whether aid has affected the political regime of recipient countries. To this end, we use annual data on Net Official Developm ..."
Abstract - Add to MetaCart
Foreign aid flows have increased considerably during the last decades, targeting, apart from development objectives, goals related to democracy. In this paper we investigate whether aid has affected the political regime of recipient countries. To this end, we use annual data on Net Official Development Assistance covering 64 aid-recipients. Because of data limitations, we cover the 1967–2002 period. We find that aid flows decreased the likelihood of observing a democratic regime in a recipient country. This effect is sensitive to economic and social conditions. The negative relation between aid and democracy is moderated when aid flows are preceded by economic liberalization. Aid from the U.S. has a non-significant effect on the political regime of recipients. © 2011 Elsevier B.V. All rights reserved. JEL classification:

Binary Models with Application to Asthma Data

by Brajendra C. Sutradhar, Patrick J. Farrell
"... In some longitudinal studies for binary data, the expectation of the binary response variable of an individual at a given point of time may depend on the covariate history up to the present time. In the same token, the variance at a given point of time and the correlation of the two responses at two ..."
Abstract - Add to MetaCart
at two given time points may also depend on the history of the time dependent covariates of the individual. In this paper, we exploit a dynamic logistic model to analyse such history based binary data. A moment based generalized quasi-likelihood (GQL) approach is considered for optimal estimation
Next 10 →
Results 1 - 10 of 16,090
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University