Sciweavers

5722 search results - page 1027 / 1145
» Security Function Interactions
Sort
View
141
Voted
CORR
2011
Springer
144views Education» more  CORR 2011»
14 years 9 months ago
Schema Redescription in Cellular Automata: Revisiting Emergence in Complex Systems
—We present a method to eliminate redundancy in the transition tables of Boolean automata: schema redescription with two symbols. One symbol is used to capture redundancy of indi...
Manuel Marques-Pita, Luis Mateus Rocha
PCS
2011
14 years 9 months ago
The parametric solution of underdetermined linear ODEs
The purpose of this paper is twofold. An immediate practical use of the presented algorithm is its applicability to the parametric solution of underdetermined linear ordinary diï¬...
Thomas Wolf
159
Voted
JMLR
2010
148views more  JMLR 2010»
14 years 9 months ago
Approximate Inference on Planar Graphs using Loop Calculus and Belief Propagation
We introduce novel results for approximate inference on planar graphical models using the loop calculus framework. The loop calculus (Chertkov and Chernyak, 2006b) allows to expre...
Vicenç Gómez, Hilbert J. Kappen, Mic...
106
Voted
MBEC
2010
14 years 9 months ago
Cell sheet integrity and nanomechanical breakdown during programmed cell death
Apoptosis is a critical physiological pathway required for the normal functioning, homeostasis, and development of many organisms. This process is highly regulated at the biochemic...
Jiashan Wang, Andrew E. Pelling
139
Voted
ML
2010
ACM
138views Machine Learning» more  ML 2010»
14 years 9 months ago
Mining adversarial patterns via regularized loss minimization
Traditional classification methods assume that the training and the test data arise from the same underlying distribution. However, in several adversarial settings, the test set is...
Wei Liu, Sanjay Chawla
« Prev « First page 1027 / 1145 Last » Next »