Results 1  10
of
5,915
DeNoising By SoftThresholding
, 1992
"... Donoho and Johnstone (1992a) proposed a method for reconstructing an unknown function f on [0; 1] from noisy data di = f(ti)+ zi, iid i =0;:::;n 1, ti = i=n, zi N(0; 1). The reconstruction fn ^ is de ned in the wavelet domain by translating all the empirical wavelet coe cients of d towards 0 by an a ..."
Abstract

Cited by 1279 (14 self)
 Add to MetaCart
Donoho and Johnstone (1992a) proposed a method for reconstructing an unknown function f on [0; 1] from noisy data di = f(ti)+ zi, iid i =0;:::;n 1, ti = i=n, zi N(0; 1). The reconstruction fn ^ is de ned in the wavelet domain by translating all the empirical wavelet coe cients of d towards 0
Mtree: An Efficient Access Method for Similarity Search in Metric Spaces
, 1997
"... A new access meth d, called Mtree, is proposed to organize and search large data sets from a generic "metric space", i.e. whE4 object proximity is only defined by a distance function satisfyingth positivity, symmetry, and triangle inequality postulates. We detail algorith[ for insertion o ..."
Abstract

Cited by 663 (38 self)
 Add to MetaCart
of objects and split management, whF h keep th Mtree always balanced  severalheralvFV split alternatives are considered and experimentally evaluated. Algorithd for similarity (range and knearest neigh bors) queries are also described. Results from extensive experimentationwith a prototype system
An extensive empirical study of feature selection metrics for text classification
 J. of Machine Learning Research
, 2003
"... Machine learning for text classification is the cornerstone of document categorization, news filtering, document routing, and personalization. In text domains, effective feature selection is essential to make the learning task efficient and more accurate. This paper presents an empirical comparison ..."
Abstract

Cited by 496 (15 self)
 Add to MetaCart
performance goals, BNS is consistently a member of the pair—e.g., for greatest recall, the pair BNS + F1measure yielded the best performance on the greatest number of tasks by a considerable margin.
The faculty of language: what is it, who has it, and how did it evolve?
 Science,
, 2002
"... We argue that an understanding of the faculty of language requires substantial interdisciplinary cooperation. We suggest how current developments in linguistics can be profitably wedded to work in evolutionary biology, anthropology, psychology, and neuroscience. We submit that a distinction should ..."
Abstract

Cited by 472 (7 self)
 Add to MetaCart
of elements. We hypothesize that FLN only includes recursion and is the only uniquely human component of the faculty of language. We further argue that FLN may have evolved for reasons other than language, hence comparative studies might look for evidence of such computations outside of the domain
Binary operations
 Journal of Formalized Mathematics
, 1989
"... Summary. In this paper we define binary and unary operations on domains. We also define the following predicates concerning the operations:... is commutative,... is associative,... is the unity of..., and... is distributive wrt.... A number of schemes useful in justifying the existence of the operat ..."
Abstract

Cited by 363 (6 self)
 Add to MetaCart
of the operations are proved. MML Identifier:BINOP_1. WWW:http://mizar.org/JFM/Vol1/binop_1.html The articles [4], [3], [5], [6], [1], and [2] provide the notation and terminology for this paper. Let f be a function and let a, b be sets. The functor f(a, b) yielding a set is defined by: (Def. 1) f(a, b) = f(〈a, b
The Immersed Interface Method for Elliptic Equations with Discontinuous Coefficients and Singular Sources
 SIAM J. Num. Anal
, 1994
"... Abstract. The authors develop finite difference methods for elliptic equations of the form V. ((x)Vu(x)) + (x)u(x) f(x) in a region in one or two space dimensions. It is assumed that gt is a simple region (e.g., a rectangle) and that a uniform rectangular grid is used. The situation is studied in wh ..."
Abstract

Cited by 273 (31 self)
 Add to MetaCart
sources, as used in Peskin’s immersed boundary method. Key words, elliptic equation, finite difference methods, irregular domain, interface, discontinuous coefficients, singular source term, delta functions AMS subject classifications. 65N06, 65N50 1. Introduction. Consider
Modal Languages And Bounded Fragments Of Predicate Logic
, 1996
"... Model Theory. These are nonempty families I of partial isomorphisms between models M and N , closed under taking restrictions to smaller domains, and satisfying the usual BackandForth properties for extension with objects on either side  restricted to apply only to partial isomorphisms of size ..."
Abstract

Cited by 273 (12 self)
 Add to MetaCart
are preserved under partial isomorphism, by a simple induction. More precisely, one proves, for any assignment A and any partial isomorphism IÎI which is defined on the Avalues for all variables x 1 , ..., x k , that M, A = f iff N , IoA = f . The crucial step in the induction is the quantifier case
A Variational Bayesian Framework for Graphical Models
 In Advances in Neural Information Processing Systems 12
, 2000
"... This paper presents a novel practical framework for Bayesian model averaging and model selection in probabilistic graphical models. Our approach approximates full posterior distributions over model parameters and structures, as well as latent variables, in an analytical manner. These posteriors ..."
Abstract

Cited by 267 (7 self)
 Add to MetaCart
the standard Expectation Maximization algorithm, and its convergence is guaranteed. We demonstrate that this approach can be applied to a large class of models in several domains, including mixture models and source separation. 1 Introduction A standard method to learn a graphical model 1 from data
A PublicKey Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
"... We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8bit, 7.3828MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secretkey cryptography has been tractable in this domain for some time, ..."
Abstract

Cited by 269 (4 self)
 Add to MetaCart
We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8bit, 7.3828MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secretkey cryptography has been tractable in this domain for some time
Making Paths Explicit in the Scout Operating System
, 1996
"... This paper makes a case for paths as an explicit abstraction in operating system design. Paths provide a unifying infrastructure for several OS mechanisms that have been introduced in the last several years, including fbufs, integrated layer processing, packet classifiers, code specialization, and m ..."
Abstract

Cited by 234 (24 self)
 Add to MetaCart
, and migrating threads. This paper articulates the potential advantages of a pathbased OS structure, describes the specific path architecture implemented in the Scout OS, and demonstrates the advantages in a particular application domainreceiving, decoding, and displaying MPEGcompressed video. 1
Results 1  10
of
5,915