Sciweavers

589 search results - page 48 / 118
» Toward General Analysis of Recursive Probability Models
Sort
View
JMLR
2010
179views more  JMLR 2010»
13 years 2 months ago
PAC-Bayesian Analysis of Co-clustering and Beyond
We derive PAC-Bayesian generalization bounds for supervised and unsupervised learning models based on clustering, such as co-clustering, matrix tri-factorization, graphical models...
Yevgeny Seldin, Naftali Tishby
SIGMETRICS
2004
ACM
107views Hardware» more  SIGMETRICS 2004»
14 years 1 months ago
On zone-balancing of peer-to-peer networks: analysis of random node join
Balancing peer-to-peer graphs, including zone-size distributions, has recently become an important topic of peer-topeer (P2P) research [1], [2], [6], [19], [31], [36]. To bring an...
Xiaoming Wang, Yueping Zhang, Xiafeng Li, Dmitri L...
DAC
1994
ACM
13 years 11 months ago
Probabilistic Analysis of Large Finite State Machines
Regarding nite state machines as Markov chains facilitates the application of probabilistic methods to very large logic synthesis and formal veri cation problems. Recently, we ha...
Gary D. Hachtel, Enrico Macii, Abelardo Pardo, Fab...
JCM
2008
109views more  JCM 2008»
13 years 7 months ago
Performance and Capacity Analysis of UWB Networks over 60GHz WPAN Channel
In this paper we evaluate the system performance and capacity of single carrier ultra-wideband (UWB) networks over 60GHz wireless personal area network (WPAN) channel. Symbol error...
Wei Li 0007, Jun Wei, Michael Smith
IWSEC
2010
Springer
13 years 6 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo