Results 1  10
of
11,770
Comparing the Perceived Seriousness and Actual Costs of Substance Abuse in Canada Analysis drawn from the 2004 Canadian Addiction Survey
, 2007
"... of Nova Scotia, New Brunswick and British Columbia. Analysis presented in this and similar reports is intended to supplement the original CAS detailed report. ..."
Abstract
 Add to MetaCart
of Nova Scotia, New Brunswick and British Columbia. Analysis presented in this and similar reports is intended to supplement the original CAS detailed report.
Consistency of spectral clustering
, 2004
"... Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family of spe ..."
Abstract

Cited by 572 (15 self)
 Add to MetaCart
Consistency is a key property of statistical algorithms, when the data is drawn from some underlying probability distribution. Surprisingly, despite decades of work, little is known about consistency of most clustering algorithms. In this paper we investigate consistency of a popular family
Estimating the Support of a HighDimensional Distribution
, 1999
"... Suppose you are given some dataset drawn from an underlying probability distribution P and you want to estimate a "simple" subset S of input space such that the probability that a test point drawn from P lies outside of S is bounded by some a priori specified between 0 and 1. We propo ..."
Abstract

Cited by 783 (29 self)
 Add to MetaCart
Suppose you are given some dataset drawn from an underlying probability distribution P and you want to estimate a "simple" subset S of input space such that the probability that a test point drawn from P lies outside of S is bounded by some a priori specified between 0 and 1. We
A logic of authentication
 ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract

Cited by 1332 (22 self)
 Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required
Just Relax: Convex Programming Methods for Identifying Sparse Signals in Noise
, 2006
"... This paper studies a difficult and fundamental problem that arises throughout electrical engineering, applied mathematics, and statistics. Suppose that one forms a short linear combination of elementary signals drawn from a large, fixed collection. Given an observation of the linear combination that ..."
Abstract

Cited by 483 (2 self)
 Add to MetaCart
This paper studies a difficult and fundamental problem that arises throughout electrical engineering, applied mathematics, and statistics. Suppose that one forms a short linear combination of elementary signals drawn from a large, fixed collection. Given an observation of the linear combination
A New Data Set Measuring Income Inequality
 World Bank Economic Review
, 1996
"... The following article is the first in an occasional series introducing new data bases. The series intends to make new development data bases more widely available and to contribute to discussion and further research on economic development issues. The data bases included in the series are selected f ..."
Abstract

Cited by 439 (1 self)
 Add to MetaCart
for their potential usefulness for research and policy analysis on critical issues in developing and transition economies. Some are drawn from microlevel firm or household surveys; others contain countrylevel data. The authors describe the data contents, criteria for inclusion or exclusion of values, sources
The Case Against Accuracy Estimation for Comparing Induction Algorithms
 In Proceedings of the Fifteenth International Conference on Machine Learning
, 1997
"... We analyze critically the use of classification accuracy to compare classifiers on natural data sets, providing a thorough investigation using ROC analysis, standard machine learning algorithms, and standard benchmark data sets. The results raise serious concerns about the use of accuracy for compar ..."
Abstract

Cited by 414 (23 self)
 Add to MetaCart
for comparing classifiers and drawinto question the conclusions that can be drawn from such studies. In the course of the presentation, we describe and demonstrate what we believe to be the proper use of ROC analysis for comparative studies in machine learning research. We argue that this methodology
Finding bugs is easy
 ACM SIGPLAN Notices
, 2004
"... Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. While these techniques are valuable, they can be difficult to apply, and they aren’t always effective in finding real bugs. Bu ..."
Abstract

Cited by 351 (8 self)
 Add to MetaCart
Many techniques have been developed over the years to automatically find bugs in software. Often, these techniques rely on formal methods and sophisticated program analysis. While these techniques are valuable, they can be difficult to apply, and they aren’t always effective in finding real bugs
Analysis of a Campuswide Wireless Network
 In Proceedings of ACM Mobicom
, 2002
"... Understanding usage patterns in wireless localarea networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace o ..."
Abstract

Cited by 308 (18 self)
 Add to MetaCart
of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campuswide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a
No escape from syntax: Don't try morphological analysis in the privacy of your own lexicon
 In U. Penn Working Papers in Linguistics
, 1997
"... Most contemporary theories of grammar assume a general organization in which elementary constituents are drawn from a place called the “Lexicon ” for composition in the syntax, as in (1). (1) STUFF Syntax Lexicon Sound Meaning (Pure) Lexicon: place from which items are drawn for the syntax; the sou ..."
Abstract

Cited by 308 (5 self)
 Add to MetaCart
Most contemporary theories of grammar assume a general organization in which elementary constituents are drawn from a place called the “Lexicon ” for composition in the syntax, as in (1). (1) STUFF Syntax Lexicon Sound Meaning (Pure) Lexicon: place from which items are drawn for the syntax
Results 1  10
of
11,770