• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 436
Next 10 →

Security without identification: transaction systems to make Big Brother obsolete

by David Chaum
"... The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations. DAVID CHAUM Computerization is robbing individuals of the ability to monitor and control the ways information about them is used. A ..."
Abstract - Cited by 505 (3 self) - Add to MetaCart
. As organizations in both the private and the public sectors routinely exchange such information, individ.uals have no way of knowing if the information is inaccurate, obsolete, or otherwise inappropriate. The foundation is being laid for a dossier society, in which computers could be used to infer individuals

Learning in the presence of inaccurate information

by Mark Fulk, Sanjay Jain - in "Proceedings of the 2nd Annual ACM Conference on Computational Learning Theory , 1989
"... The present paper considers the effects of introducing inaccuracies in a learner’s environ-ment in Gold’s learning model of identification in the limit. Three kinds of inaccuracies are considered: presence of spurious data is modeled as learning from a noisy environment, miss-ing data is modeled as ..."
Abstract - Cited by 11 (3 self) - Add to MetaCart
The present paper considers the effects of introducing inaccuracies in a learner’s environ-ment in Gold’s learning model of identification in the limit. Three kinds of inaccuracies are considered: presence of spurious data is modeled as learning from a noisy environment, miss-ing data is modeled

Toward the accurate identification of network applications

by Andrew W. Moore, Konstantina Papagiannaki - In PAM , 2005
"... Abstract. Well-known port numbers can no longer be used to reliably identify network applications. There is a variety of new Internet applications that either do not use well-known port numbers or use other protocols, such as HTTP, as wrappers in order to go through firewalls without being blocked. ..."
Abstract - Cited by 173 (13 self) - Add to MetaCart
. One consequence of this is that a simple inspection of the port numbers used by flows may lead to the inaccurate classification of network traffic. In this work, we look at these inaccuracies in detail. Using a full payload packet trace collected from an Internet site we attempt to identify the types

Learning from Multiple Sources of Inaccurate Data

by Ganesh Baliga, Sanjay Jain, Arun Sharma - in "Proceedings of the International Workshop on Analogical and Inductive Inference in Dagstuhl , 1992
"... Abstract. Most theoretical models of inductive inference make the idealized assumption that the data available to a learner is from a single and accurate source. The subject of inaccuracies in data emanating from a single source has been addressed by several authors. The present paper argues in favo ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
in favor of a more realistic learning model in which data emanates from multiple sources, some or all of which may be inaccurate. Three kinds of inaccuracies are considered: spurious data (modeled as noisy texts), missing data (modeled as incomplete texts), and a mixture of spurious and missing data

IMPACT OF INACCURATE DATA ON SUPPLY CHAIN INVENTORY PERFORMANCE

by unknown authors
"... ii This research explores data inaccuracy and its impact on supply chain inventory performance. Theft and data entry error cause differences between the physical inventory levels and inventory levels recorded in the computer system. Physical inventory counts are one method commonly used to align phy ..."
Abstract - Add to MetaCart
physical and recorded inventory levels. Expected benefits of new technology, such as radio frequency identification (RFID) include improvements in the accuracy of supply chain data, including possibilities of real-time alignment of the data. This research looks at the factors of theft, order error, lead

Automated detection of inaccurate and imprecise transitions in peptide quantification by multiple reaction monitoring mass spectrometry

by Susan E. Abbatiello, D. R. Mani, Hasmik Keshishian, Steven A. Carr - Clin. Chem. 2009
"... BACKGROUND—Multiple reaction monitoring mass spectrometry (MRM-MS) of peptides with stable isotope–labeled internal standards (SISs) is increasingly being used to develop quantitative assays for proteins in complex biological matrices. These assays can be highly precise and quantitative, but the fre ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
, but the frequent occurrence of interferences requires that MRM-MS data be manually reviewed, a time-intensive process subject to human error. We developed an algorithm that identifies inaccurate transition data based on the presence of interfering signal or inconsistent recovery among replicate samples. METHODS

Comparison of Methods for the Identification of Coagulase- negative

by Maria Lourdes, Rs Cunha, Yuri K Sinzato, Liciana Va Silveira
"... Coagulase-negative staphylococci (CNS) species identification is still difficult for most clinical laboratories. The scheme proposed by Kloos and Schleifer and modified by Bannerman is the reference method used for the identification of staphylococcal species and subspecies; however, this method is ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
(simplified method and disk method), in the identification of 100 CNS strains. Compared to the reference method, the simplified method and disk method correctly identified 100 and 99% of the CNS species, respectively, while this rate was 84 % for the API Staph system. Inaccurate identification by the API

Scalable and Accurate Identification of AS-Level Forwarding Paths

by Z. Morley Mao, David Johnson, Jennifer Rexford, Jia Wang, Mao David, Johnson Jennifer, Rexford Jia, Randy Katz , 2004
"... Traceroute is used heavily by network operators and researchers to identify the IP forwarding path from a source to a destination. In practice, knowing the Autonomous System (AS) associated with each hop in the path is also quite valuable. In previous work we showed that the IP-to-AS mapping extract ..."
Abstract - Cited by 57 (2 self) - Add to MetaCart
extracted from BGP routing tables is not sufficient for determining the ASlevel forwarding paths [1]. By comparing BGP and traceroute AS paths from multiple vantage points, [1] proposed heuristics that identify the root causes of the mismatches and fix the inaccurate IP-to-AS mappings. These heuristics

ACAS: Automated construction of application signatures

by Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang - In SIGCOMM’05 MineNet Workshop , 2005
"... An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identified using well-known default server network-port numbers in the TCP or UDP headers. However this approach has become increas ..."
Abstract - Cited by 91 (1 self) - Add to MetaCart
increasingly inaccurate. An alternate, more accurate technique is to use specific application-level features in the protocol exchange to guide the identification. Unfortunately deriving the signatures manually is very time consuming and difficult. In this paper, we explore automatically extracting application

Epoch extraction from linear prediction residual for identification of closed glottis interval

by Tirupattur V. Ananthapadmanabha - IEEE Trans. Acoust. Speech Signal Proc , 1979
"... Further, since the digital inverse filter does not compensate the-phase response of the vocal tract system exactly, there is an uncertainty in the estimated epoch position. In this paper we present an interpretation of LP residual by considering the effect of the following factors: 1)-the shape of g ..."
Abstract - Cited by 50 (17 self) - Add to MetaCart
of glottal pulses, 2) inaccurate estimation of formants and band-widths, 3) phase angles. of formants at the instants of excitation, and 4) zeros in the vocal tract system. A method for the unambiguous identification of epochs from LP residual is then presented. The ac-curacy of the method is tested
Next 10 →
Results 1 - 10 of 436
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University