Sciweavers

3281 search results - page 397 / 657
» An Approach to use Executable Models for Testing
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 4 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
165
Voted
PPSN
2010
Springer
15 years 2 months ago
Feature Selection for Multi-purpose Predictive Models: A Many-Objective Task
The target of machine learning is a predictive model that performs well on unseen data. Often, such a model has multiple intended uses, related to different points in the tradeoff ...
Alan P. Reynolds, David W. Corne, Michael J. Chant...
114
Voted
ICASSP
2011
IEEE
14 years 8 months ago
A modified MAP criterion based on hidden Markov model for voice activity detecion
The maximum a posteriori (MAP) criterion is broadly used in the statistical model-based voice activity detection (VAD) approaches. In the conventional MAP criterion, however, the ...
Shiwen Deng, Jiqing Han, Tieran Zheng, Guibin Zhen...
JMLR
2010
121views more  JMLR 2010»
14 years 11 months ago
A comparison of AUC estimators in small-sample studies
Reliable estimation of the classification performance of learned predictive models is difficult, when working in the small sample setting. When dealing with biological data it is ...
Antti Airola, Tapio Pahikkala, Willem Waegeman, Be...
ICFP
2002
ACM
16 years 4 months ago
A demand-driven adaptive type analysis
Compilers for dynamically and statically typed languages ensure safe execution by verifying that all operations are performed on appropriate values. An operation as simple as car ...
Danny Dubé, Marc Feeley