Results 1  10
of
1,515,797
Loopy belief propagation for approximate inference: An empirical study. In:
 Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" the use of Pearl's polytree algorithm in a Bayesian network with loops can perform well in the context of errorcorrecting codes. The most dramatic instance of this is the near Shannonlimit performanc ..."
Abstract

Cited by 676 (15 self)
 Add to MetaCart
of the leaves were represented by a noisyor: ? (Child= OIParents) = eBoL; B,Paren t; where 110 represents the "leak" term. The QMRDT network The QMRDT is a bipartite network whose structure is the same as that shown in figure 2 but the size is much larger. There are approximately 600 diseases
Segmentation using eigenvectors: A unifying view
 In ICCV
, 1999
"... Automatic grouping and segmentation of images remains a challenging problem in computer vision. Recently, a number of authors have demonstrated good performance on this task using methods that are based on eigenvectors of the a nity matrix. These approaches are extremely attractive in that they are ..."
Abstract

Cited by 380 (1 self)
 Add to MetaCart
of this approach, the estimation process leads to a notoriously di cult optimization. The frequently used EM algorithm [3] often converges to a local maximum that depends on the initial conditions. Recently, anumber of authors [11, 10, 8, 9, 2] have suggested alternative segmentation methods that are based
Whom You Know Matters: Venture Capital Networks and Investment Performance,
 Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm'slength, spotmarket transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract

Cited by 138 (8 self)
 Add to MetaCart
with diminishing returns to scale. The adjusted R 2 in model (3) is 13.6%. Because fund sequence number appears to have little effect on fund performance in our dataset, and because it is frequently unavailable in the Venture Economics database, we replace it with a dummy equaling one for firsttime funds. We also
Anonymous Hierarchical IdentityBased Encryption (Without Random Oracles). In: Dwork
 CRYPTO 2006. LNCS,
, 2006
"... Abstract We present an identitybased cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract

Cited by 119 (10 self)
 Add to MetaCart
, there have been a number of IBE schemes proven secure without random oracles, such as BTE from where r is chosen by the encryptor and g, g 1 , g 3 , and e(g 1 ,ĝ 2 ) are public system parameters. Notice, there are now two elements in G, and between them there is enough redundancy to determine whether a
Selfconcordance at work: Toward understanding the motivational effects of transformational leaders.
 Academy of Management Journal,
, 2003
"... We extend existing theories by linking transformational leadership to "selfconcordance" at work. In two studies using diverse samples and methods, leader behaviors were associated with follower tendencies to set selfconcordant goals. In general, followers of transformational leaders vie ..."
Abstract

Cited by 113 (3 self)
 Add to MetaCart
; Elliot, 1999). The selfconcordance model is a theory of selfregulation, that is based in selfdetermination theory In a recent series of studies, Sheldon and colleagues (e.g., Sheldon & Elliot, 1998 found that autonomous (versus controlled) motivation was associated with goaldirected effort, goal
Indicators for Social and Economic Coping Capacity  Moving Toward a Working Definition of Adaptive Capacity”, WesleyanCMU Working Paper.
, 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract

Cited by 109 (14 self)
 Add to MetaCart
be reflected by the minimum feasibility factor assigned to any of these determinants; i.e., FF j ≡ min{ff j (2), … ff j (8)}. Each factor inserted into equation The ability of adaptation option (j) to, in fact, influence a system's exposure or sensitivity to an external stress can meanwhile be reflected
The Lorenz attractor exists
 C. R. Acad. Sci. Paris
, 1999
"... We prove that the Lorenz equations support a strange attractor, as conjectured by Edward Lorenz in 1963. We also prove that the attractor is robust, i.e., it persists under small perturbations of the coefficients in the underlying differential equations. The proof is based on a combination of normal ..."
Abstract

Cited by 83 (5 self)
 Add to MetaCart
of normal form theory and rigorous numerical computations. 1 Introduction The following nonlinear system of differential equations, x1 = \Gammaoex 1 + oex2 x2 = %x1 \Gamma x2 \Gamma x1x3 (1) x3 = \Gammafi x3 + x1x2 ; was introduced 1963 by Edward Lorenz, see [4]. As a crude model of atmospheric
Role of experience and oscillations in transforming a rate code into a temporal code.
 Nature
, 2002
"... While precise spike timing is critical for synaptic plasticity, neither the mechanism for generating a temporal code that establishes such precise spike timing in vivo, nor the effect of experience on such a temporal code have been established. Here we propose a mechanism by which a temporal code c ..."
Abstract

Cited by 81 (2 self)
 Add to MetaCart
can be generated through an interaction between an asymmetric rate code and oscillatory inhibition. Consistent with the predictions of our model the rate 1,2 and temporal 35 codes of hippocampal pyramidal neurons are highly correlated. Furthermore, the temporal code becomes more robust
Testing Inequality Constraints in Linear Econometric Models
 Journal of Econometrics
, 1989
"... This paper develops three asymptotically equivalent tests for examining the validity of imposing linear inequality restrictions on the parameters of linear econometric models. First we consider the model.v = X/3 + e. where r is N(O,8), and the hypothesis test H: R/l 1 r versus K: p E R”. Later we ge ..."
Abstract

Cited by 51 (1 self)
 Add to MetaCart
This paper develops three asymptotically equivalent tests for examining the validity of imposing linear inequality restrictions on the parameters of linear econometric models. First we consider the model.v = X/3 + e. where r is N(O,8), and the hypothesis test H: R/l 1 r versus K: p E R”. Later we
Party over Policy: The Dominating Impact of Group Influence
 on Political Beliefs.’’ Journal of Personality and Social Psychology
, 2003
"... Four studies demonstrated both the power of group influence in persuasion and people's blindness to it. Even under conditions of effortful processing, attitudes toward a social policy depended almost exclusively upon the stated position of one's political party. This effect overwhelmed th ..."
Abstract

Cited by 86 (7 self)
 Add to MetaCart
policy (M ϭ 3.20), t(46) ϭ 3.92, p Ͻ .001. Neither analysis yielded main effects or interactions involving participant knowledge, all Fs Ͻ 2. (Using participant knowledge as a continuous variable in a regression model yielded the same null result, all Fs Ͻ 1.) SelfPerceived Bases of Attitudes
Results 1  10
of
1,515,797