Results 11 - 20
of
39,820
Linear models and empirical bayes methods for assessing differential expression in microarray experiments.
- Stat. Appl. Genet. Mol. Biol.
, 2004
"... Abstract The problem of identifying differentially expressed genes in designed microarray experiments is considered. Lonnstedt and Speed (2002) derived an expression for the posterior odds of differential expression in a replicated two-color experiment using a simple hierarchical parametric model. ..."
Abstract
-
Cited by 1321 (24 self)
- Add to MetaCart
. The purpose of this paper is to develop the hierarchical model of Lonnstedt and Speed (2002) into a practical approach for general microarray experiments with arbitrary numbers of treatments and RNA samples. The model is reset in the context of general linear models with arbitrary coefficients and contrasts
Robust face recognition via sparse representation
- IEEE TRANS. PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 2008
"... We consider the problem of automatically recognizing human faces from frontal views with varying expression and illumination, as well as occlusion and disguise. We cast the recognition problem as one of classifying among multiple linear regression models, and argue that new theory from sparse signa ..."
Abstract
-
Cited by 936 (40 self)
- Add to MetaCart
signal representation offers the key to addressing this problem. Based on a sparse representation computed by ℓ 1-minimization, we propose a general classification algorithm for (image-based) object recognition. This new framework provides new insights into two crucial issues in face recognition: feature
Ecology of the family as a context for human development: Research perspectives.
- Developmental Psychology,
, 1986
"... This review collates and examines critically a theoretically convergent but widely dispersed body of research on the influence of external environments on the functioning of families as contexts of human development. Investigations falling within this expanding domain include studies of the interac ..."
Abstract
-
Cited by 518 (0 self)
- Add to MetaCart
; and public policies affecting families and children. A second major focus is on the patterning of environmental events and transitions over the life course as these affect and are affected by intrafamilial processes. Special emphasis is given to critical research gaps in knowledge and priorities for future
Measuring the information content of stock trades
- Journal of Finance
, 1991
"... This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE is ..."
Abstract
-
Cited by 469 (11 self)
- Add to MetaCart
significant for smaller firms. CENTRALTO THE ANALYSIS of market microstructure is the notion that in a market with asymmetrically informed agents, trades convey information and therefore cause a persistent impact on the security price. The magnitude of the price effect for a given trade size is generally held
Open Mind Common Sense: Knowledge acquisition from the general public
, 2002
"... Abstract. Open Mind Common Sense is a knowledge acquisition system designed to acquire commonsense knowledge from the general public over the web. We describe and evaluate our first fielded system, which enabled the construction of a 450,000 assertion commonsense knowledge base. We then discuss how ..."
Abstract
-
Cited by 172 (11 self)
- Add to MetaCart
Abstract. Open Mind Common Sense is a knowledge acquisition system designed to acquire commonsense knowledge from the general public over the web. We describe and evaluate our first fielded system, which enabled the construction of a 450,000 assertion commonsense knowledge base. We then discuss how
Explaining Cryptosystems to the General Public
"... : Modern cryptography can achieve levels of security and authentication that non-specialists find literally incredible. Techniques include informationhiding protocols, zero-knowledge proofs and public key cryptosystems; they can be used to support applications like digital signatures, digital cas ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
cash, on-line poker and secure voting in ways that are provably secure --- far more secure than the traditional systems they replace. This paper describes simple versions of such applications that have been used to give school-children and the general public a broad understanding of what can
On the Rationality of the General Public
, 2005
"... Using Allensbach survey data about how people look forward to the coming year, we construct true ex post-forecasts and compare them with the forecasts produced by the German Council of Economic Experts and by the Economic Research Institutes. Then, we perform rationality tests for these forecast ser ..."
Abstract
- Add to MetaCart
the professional forecasts do not. Thus, when making expectations, the German general public seems to consider more information than the professional forecasters.
Formal Methods: State of the Art and Future Directions
- ACM Computing Surveys
, 1996
"... ing with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works, requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept, ACM Inc., 1515 Broadway, New York, N ..."
Abstract
-
Cited by 425 (6 self)
- Add to MetaCart
ing with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works, requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept, ACM Inc., 1515 Broadway, New York
The Constitution of
, 1960
"... Copyright 2013 by the Office of the General Assembly Presbyterian Church (U.S.A.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronically, mechanically, photocopying, recording, or otherwise (brief quotations used in mag ..."
Abstract
-
Cited by 411 (2 self)
- Add to MetaCart
Copyright 2013 by the Office of the General Assembly Presbyterian Church (U.S.A.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronically, mechanically, photocopying, recording, or otherwise (brief quotations used
On The Limits of Steganography
- IEEE Journal of Selected Areas in Communications
, 1998
"... In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to ..."
Abstract
-
Cited by 413 (2 self)
- Add to MetaCart
that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist
Results 11 - 20
of
39,820