Sciweavers

5948 search results - page 63 / 1190
» Computing Robust Counter-Strategies
Sort
View
CSDA
2008
94views more  CSDA 2008»
14 years 10 months ago
Robust model selection using fast and robust bootstrap
Robust model selection procedures control the undue influence that outliers can have on the selection criteria by using both robust point estimators and a bounded loss function wh...
Matias Salibian-Barrera, Stefan Van Aelst
IAJIT
2011
14 years 1 months ago
DWT-based audio watermarking
: Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking....
Ali Al-Haj, Ahmad A. Mohammad, Lama Bata
SMA
2010
ACM
200views Solid Modeling» more  SMA 2010»
14 years 4 months ago
Influence functions of the Spearman and Kendall correlation measures
Abstract Nonparametric correlation estimators as the Kendall and Spearman correlation are widely used in the applied sciences. They are often said to be robust, in the sense of bei...
Christophe Croux, Catherine Dehon
COMPUTING
2002
57views more  COMPUTING 2002»
14 years 9 months ago
Problem Dependent Generalized Prewavelets
In this paper, we present a new approach to construct robust multilevel algorithms for elliptic differential equations. The multilevel algorithms consist of multiplicative subspac...
Christoph Pflaum
GEM
2009
14 years 7 months ago
Degenerate Neutrality Creates Evolvable Fitness Landscapes
- Understanding how systems can be designed to be evolvable is fundamental to research in optimization, evolution, and complex systems science. Many researchers have thus recognize...
James M. Whitacre, Axel Bender