Sciweavers

4270 search results - page 97 / 854
» A Permutation Approach to Validation
Sort
View
JORS
2010
134views more  JORS 2010»
14 years 11 months ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
CEC
2007
IEEE
15 years 10 months ago
Memetic algorithms for inexact graph matching
—The noise-robust matching of two graphs is a hard combinatorial problem with practical importance in several domains. In practical applications, a unique solution for a given in...
Thomas Bärecke, Marcin Detyniecki
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
15 years 10 months ago
Aggregate Query Answering on Anonymized Tables
Privacy is a serious concern when microdata need to be released for ad hoc analyses. The privacy goals of existing privacy protection approaches (e.g., -anonymity and -diversity) ...
Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Y...
PTS
2000
75views Hardware» more  PTS 2000»
15 years 5 months ago
Structural Coverage For LOTOS - a Probe Insertion Technique
Coverage analysis of programs and specifications is a common approach to measure the quality and the adequacy of a test suite. This paper presents a probe insertion technique for m...
Daniel Amyot, Luigi Logrippo
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 5 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi