|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1261 occurrences of 825 keywords
|
|
|
Results
Found 5810 publication records. Showing 5810 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
82 | Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney |
Understanding Measurement Perturbation in Trace-based Data. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Stefan Funke, Christian Klein 0001, Kurt Mehlhorn, Susanne Schmitt |
Controlled perturbation for Delaunay triangulations. |
SODA |
2005 |
DBLP BibTeX RDF |
controlled perturbation, oating point computation, randomized incremental construction, delaunay triangulations, convex hulls, randomized incremental algorithm |
74 | Zhipeng Lü, Jin-Kao Hao |
A Critical Element-Guided Perturbation Strategy for Iterated Local Search. |
EvoCOP |
2009 |
DBLP DOI BibTeX RDF |
perturbation operator, critical element-guided perturbation, course timetabling, graph coloring, iterated local search |
72 | Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su 0001 |
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. |
ISSTA |
2010 |
DBLP DOI BibTeX RDF |
testing, stability, floating-point, perturbation, numerical code |
67 | Everardo Gutiérrez, Carlos A. Brizuela |
ILS-Perturbation Based on Local Optima Structure for the QAP Problem. |
MICAI |
2006 |
DBLP DOI BibTeX RDF |
Big Valley, Perturbation Length, Quadratic Assignment Problem, Iterated Local Search |
67 | Jeff Offutt, Wuzhi Xu |
Generating test cases for web services using data perturbation. |
ACM SIGSOFT Softw. Eng. Notes |
2004 |
DBLP DOI BibTeX RDF |
web services, XML, SOAP, data perturbation |
67 | Jintai Ding |
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
open-key, perturbation, multivariable, quadratic polynomials |
60 | Dan Halperin, Eran Leiserowitz |
Controlled perturbation for arrangements of circles. |
SCG |
2003 |
DBLP DOI BibTeX RDF |
robustness, arrangements, perturbation |
60 | Naim Ben-Hamida, Khaled Saab 0001, David Marche, Bozena Kaminska |
A perturbation based fault modeling and simulation for mixed-signal circuits. |
Asian Test Symposium |
1997 |
DBLP DOI BibTeX RDF |
analog circuit fault simulation, perturbation fault model, fault abstraction, structural fault modeling, perturbation estimation, fault observation, hierarchical analog fault simulator, complexity, test generation, CMOS, mixed-signal circuits, mixed analogue-digital integrated circuits, functional fault modeling, physical defects |
53 | Sheng Zhong 0002, Zhiqiang Yang |
Guided perturbation: towards private and accurate mining. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Steven Y. Ko, Indranil Gupta |
Perturbation-Resistant and Overlay-Independent Resource Discovery. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yaron Rachlin, Katharina Probst, Rayid Ghani |
Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods. |
PinKDD |
2008 |
DBLP DOI BibTeX RDF |
Noise perturbation, privacy, anonymity, statistical disclosure control |
53 | Vivien Dubois, Louis Granboulan, Jacques Stern |
Cryptanalysis of HFE with Internal Perturbation. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE |
52 | Allen D. Malony, Daniel A. Reed, Harry A. G. Wijshoff |
Performance Measurement Intrusion and Perturbation Analysis. |
IEEE Trans. Parallel Distributed Syst. |
1992 |
DBLP DOI BibTeX RDF |
instrumentation perturbations, softwareevent tracing, Alliant FX/80 vector multiprocessor, true performance, instrumentedexecution, instrumentation coverage, source level instrumentation, hardwareinteractions, performance evaluation, parallel programming, performance measurement, perturbation analysis, perturbation theory |
50 | Somnath Chakrabarti, Zhiyuan Chen 0003, Aryya Gangopadhyay, Shibnath Mukherjee |
Privacy preserving linear discriminant analysis from perturbed data. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
|
50 | Shipra Agrawal 0001, Jayant R. Haritsa, B. Aditya Prakash |
FRAPP: a framework for high-accuracy privacy-preserving mining. |
Data Min. Knowl. Discov. |
2009 |
DBLP DOI BibTeX RDF |
Data mining, Privacy |
50 | Shipra Agrawal 0001, Jayant R. Haritsa |
A Framework for High-Accuracy Privacy-Preserving Mining. |
ICDE |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
46 | Jun Liu, Xiangqian Liu, Xiaoli Ma |
First-Order Perturbation Analysis of Singular Vectors in Singular Value Decomposition. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Wee Seng Chua, Chau Yuen, Francois P. S. Chin |
A Continuous Vector-Perturbation for Multi-Antenna Multi-User Communication. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
46 | J. C. E. van der Burg, L. J. R. Casius, Idsart Kingma, Jaap H. van Dieën, Arthur J. van Soest |
Factors underlying the perturbation resistance of the trunk in the first part of a lifting movement. |
Biol. Cybern. |
2005 |
DBLP DOI BibTeX RDF |
Muscle dynamics, Perturbations, Lifting, Forward simulation |
46 | Paulito P. Palmes, Shiro Usui |
The Influence of Gaussian, Uniform, and Cauchy Perturbation Functions in the Neural Network Evolution. |
ICONIP |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Branson W. Murrill, Larry J. Morell, Erika Olimpiew |
A Perturbation-based Testing Strategy. |
ICECCS |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Magdy A. El-Tawil |
The Homotopy Wiener-Hermite Expansion and Perturbation Technique (WHEP). |
Trans. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
Non-linear stochastic differential equations, Wiener-Hermite expansion, WHEP technique, Homotopy perturbation |
46 | Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii |
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
piece in hand concept, perturbation vector, public key cryptosystem, multivariate polynomial, multivariate public key cryptosystem |
46 | Xiao-Bai Li, Sumit Sarkar |
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining. |
IEEE Trans. Knowl. Data Eng. |
2006 |
DBLP DOI BibTeX RDF |
data mining, Privacy, kd-trees, microaggregation, data perturbation |
46 | S. P. Chan |
A Robust Control Law with Estimated Perturbation Compensation for Robot Manipulators. |
J. Intell. Robotic Syst. |
2003 |
DBLP DOI BibTeX RDF |
perturbation compensation, equivalent control, robot manipulators, sliding mode, variable structure control |
46 | Min Chen, James Arvo |
Theory and application of specular path perturbation. |
ACM Trans. Graph. |
2000 |
DBLP DOI BibTeX RDF |
implicit surfaces, optics, specular reflection, Taylor series, perturbation theory |
46 | S. P. Chan |
Variable Structure Control of Robot Manipulators with Perturbation Estimator. |
J. Intell. Robotic Syst. |
1999 |
DBLP DOI BibTeX RDF |
perturbation compensation, system uncertainties, robot manipulators, sliding mode, variable structure control |
46 | Visvanathan Ramesh, Robert M. Haralick |
Random perturbation models for boundary extraction sequence. |
Mach. Vis. Appl. |
1997 |
DBLP DOI BibTeX RDF |
Random perturbation models, Boundary extraction sequence, Computer vision algorithms, Performance characterization |
43 | Manish Airy, Sandeep Bhadra, Robert W. Heath Jr., Sanjay Shakkottai |
Transmit Precoding for the Multiple Antenna Broadcast Channel. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Jim Dowd, Shouhuai Xu, Weining Zhang |
Privacy-Preserving Decision Tree Mining Based on Random Substitutions. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
data mining, decision tree, Privacy-preservation, matrix, perturbation |
43 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
43 | Xi-Ren Cao |
A new method of performance sensitivity analysis for non-Markovian queueing networks. |
Queueing Syst. Theory Appl. |
1992 |
DBLP DOI BibTeX RDF |
Realization factors, perturbation analysis, convergence properties |
41 | Bertrand M. Hochwald, Christian B. Peel, A. Lee Swindlehurst |
A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation. |
IEEE Trans. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Aurél Galántai |
Problems and Results in Matrix Perturbation Theory. |
Towards Intelligent Engineering and Information Technology |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Manuel Lozano 0001, Carlos García-Martínez |
An Evolutionary ILS-Perturbation Technique. |
Hybrid Metaheuristics |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Li Liu, Bhavani Thuraisingham |
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. |
ICDM Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Lourival F. Júnior de Almeida, Silvia Regina Vergilio |
Exploring Perturbation Based Testing for Web Services. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Zhi-Hua Zhou, Yang Yu 0001 |
Ensembling local learners ThroughMultimodal perturbation. |
IEEE Trans. Syst. Man Cybern. Part B |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Luping Chen, John H. R. May, Gordon Hughes |
A Constant Perturbation Method for Evaluation of Structural Diversity in Multiversion Software. |
SAFECOMP |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Larry J. Morell, Branson W. Murrill |
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets. |
ISSTA |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Victor Milenkovic, Elisha Sacks, Min-Ho Kyung |
Robust Minkowski sums of polyhedra via controlled linear perturbation. |
Symposium on Solid and Physical Modeling |
2010 |
DBLP DOI BibTeX RDF |
perturbation methods, robust computational geometry |
38 | Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz |
Attacking cryptographic schemes based on "perturbation polynomials". |
CCS |
2009 |
DBLP DOI BibTeX RDF |
pairwise key establishment, random perturbation polynomial, sensor network security |
38 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
38 | Willard Frutiger, Jeremy Collins, Wei Hu |
Using Random Perturbation Method to Improve Efficacy Prediction of siRNA Sequences. |
BMEI (1) |
2008 |
DBLP DOI BibTeX RDF |
siRNA, linear model, random perturbation |
38 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
38 | Jordi Castro 0001 |
Computational Experiments with Minimum-Distance Controlled Perturbation Methods. |
Privacy in Statistical Databases |
2004 |
DBLP DOI BibTeX RDF |
controlled perturbation methods, linear programming, quadratic programming, statistical disclosure control |
38 | Haimonti Dutta, Hillol Kargupta, Souptik Datta, Krishnamoorthy Sivakumar |
Analysis of privacy preserving random perturbation techniques: further explorations. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
security, privacy, random-perturbation |
38 | Wenliang Du, Aditya P. Mathur |
Testing for Software Vulnerability Using Environment Perturbation. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
environment perturbation, fault injection, Security testing, security flaws |
38 | Krishnamurty Muralidhar, Rathindra Sarathy |
Security of Random Data Perturbation Methods. |
ACM Trans. Database Syst. |
1999 |
DBLP DOI BibTeX RDF |
random data perturbation, bias, covariance, noise addition |
38 | Patrick Tendick, Norman S. Matloff |
A Modified Random Perturbation Method for Database Security. |
ACM Trans. Database Syst. |
1994 |
DBLP DOI BibTeX RDF |
random perturbation method, correlation, bias, noise addition |
36 | Daofeng Xu, Yongming Huang, Luxi Yang |
Improved nonlinear multiuser precoding using lattice reduction. |
Signal Image Video Process. |
2009 |
DBLP DOI BibTeX RDF |
Multiuser precoding, MIMO, Lattice reduction |
36 | Yongming Huang, Daofeng Xu, Luxi Yang, Yinggang Du, Bin Li |
Limited Feedback Precoding Based on Hierarchical Codebook and Linear Receiver. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Hazem N. Nounou, Mohamed N. Nounou |
Resilient adaptive control of uncertain time-delay systems - a delay-dependent approach. |
CDC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | SangJoo Kwon, KwangWoong Yang, Sangdeok Park |
An Effective Kalman Filter Localization Method for Mobile Robots. |
IROS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Arturo Forner-Cordero, H. F. J. M. Koopman, Frans C. T. van der Helm |
Mechanical model of the recovery from stumbling. |
Biol. Cybern. |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Zhouchen Lin, Heung-Yeung Shum |
Response to the Comments on "Fundamental Limits of Reconstruction-Based Superresolution Algorithms under Local Translation'. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2006 |
DBLP DOI BibTeX RDF |
reconstruction-based algorithms, Superresolution, perturbation theory |
36 | Shalabh Bhatnagar |
Adaptive multivariate three-timescale stochastic approximation algorithms for simulation based optimization. |
ACM Trans. Model. Comput. Simul. |
2005 |
DBLP DOI BibTeX RDF |
Adaptive three-timescale stochastic approximation algorithms, Newton-type algorithms, simultaneous perturbation stochastic approximation, simulation optimization |
31 | Debasri Saha, Susmita Sur-Kolay |
Encoding of Floorplans through Deterministic Perturbation. |
VLSI Design |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Yupu Hu, Baocang Wang, Wencai He |
NTRUSign With a New Perturbation. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Feng Wan, Wei-Ping Zhu 0001, M. N. S. Swamy |
Perturbation analysis of subspace-based semi-blind MIMO channel estimation approaches. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | He Zhang, Wai Kin Chan |
Mathematical programming-based perturbation analysis for GI/G/1 queues. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Catherine L. Zhou, Wai-Chung Tang, Wing-Hang Lo, Yu-Liang Wu |
How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs. |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ping Zhao 0004, Chun Zhao, Peter G. Casazza |
Perturbation of Regular Sampling in Shift-Invariant Spaces for Frames. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Tobias Andersson Granberg |
Solving the flight perturbation problem with meta heuristics. |
J. Heuristics |
2006 |
DBLP DOI BibTeX RDF |
Aircraft recovery, Irregular operations, Operational airline scheduling, Simulated annealing, Tabu search, Path relinking |
31 | Keke Chen, Ling Liu 0001 |
Privacy Preserving Data Classification with Rotation Perturbation. |
ICDM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Yufei Zhou, Herbert H. C. Iu, Chi Kong Tse, Jun-Ning Chen |
Controlling chaos in DC/DC converters using optimal resonant parametric perturbation. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Nikolai D. Christov, Michail M. Konstantinov, Petko Hr. Petkov |
New Perturbation Bounds for the Continuous-Time H infinity-Optimization Problem. |
NAA |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Wen-Yi Zhao |
Performance Perturbation Analysis of Eigen-Systems. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Claude-Pierre Jeannerod |
An algorithm for the eigenvalue perturbation problem: reduction of a -matrix to a Lidskii matrix. |
ISSAC |
2000 |
DBLP DOI BibTeX RDF |
|
31 | William Hendrix, Matthew C. Schmidt, Paul Breimyer, Nagiza F. Samatova |
On perturbation theory and an algorithm for maximal clique enumeration in uncertain and noisy graphs. |
KDD Workshop on Knowledge Discovery from Uncertain Data |
2009 |
DBLP DOI BibTeX RDF |
graph perturbation theory, maximal clique enumeration, graph algorithms, biological applications |
31 | Lei Su, Hongzhi Liao, Zhengtao Yu 0001, Jiahua Tang |
Semi-supervised Learning with Multimodal Perturbation. |
ISNN (1) |
2009 |
DBLP DOI BibTeX RDF |
Multimodal Perturbation, Machine Learning, Semi-Supervised Learning, Ensemble Learning, Co-training |
31 | Houde Han, Zhongyi Huang, R. Bruce Kellogg |
A Tailored Finite Point Method for a Singular Perturbation Problem on an Unbounded Domain. |
J. Sci. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Tailored finite point method, Singular perturbation problem, Unbounded domain, Artificial boundary condition |
31 | Jesús Aransay, Clemens Ballarin, Julio Rubio 0001 |
A Mechanized Proof of the Basic Perturbation Lemma. |
J. Autom. Reason. |
2008 |
DBLP DOI BibTeX RDF |
Homological algebra, Basic perturbation lemma, Isabelle |
31 | Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo |
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. |
MobiHoc |
2008 |
DBLP DOI BibTeX RDF |
pairwise key establishment, sensor network security, random perturbation |
31 | Dong-Jun Bang, Tae-Gun Jeong |
Perturbation Analysis of the Combination Resonances of a Thin Cantilever Beam under Vertical Excitations. |
ICCSA (1) |
2008 |
DBLP DOI BibTeX RDF |
Parametric Excitation, Mathieu Equation, Method of Multiple Scales, Combination Resonance, Perturbation Analysis, Stability Criterion |
31 | Mario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy |
A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Tail Dependence, Copula, Data Perturbation, Data Masking |
31 | Hiroyasu Nagata, Jin Yoshimura, Kei-ichi Tainaka |
A Slight Delay in the Onset of Conservation May Bring about an Abrupt Increase of Extinction Risk: Perturbation Experiments in an Ecological Lattice Model. |
ACRI |
2008 |
DBLP DOI BibTeX RDF |
fluctuation enhancement(FE), perturbation experiment (PE), local interaction(LI), global interaction(GI), contact process(CP) |
31 | Wensheng Zhang 0001, Minh Tran, Sencun Zhu, Guohong Cao |
A random perturbation-based scheme for pairwise key establishment in sensor networks. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
pairwise key establishment, polynomial, sensor network security, random perturbation |
31 | Otis Brooks |
Solving discrete resource allocation problems using the Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
discrete stochastic optimization, simultaneous perturbation stochastic approximation, resource allocation |
31 | Yifen Lai, Shuili Chen |
On the Perturbation of Fuzzy Matrix Equations with v-T Composition. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Fuzzy matrix equation, Perturbation, Solution |
31 | Li Chen, Dmitry B. Goldgof, Lawrence O. Hall, Steven Eschrich |
Noise-Based Feature Perturbation as a Selection Method for Microarray Data. |
ISBRA |
2007 |
DBLP DOI BibTeX RDF |
Feature perturbation, microarray gene expression data, classification, gene selection |
31 | Nazni Farooq, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
query camouflage system, online medical survey, multi-agent, data perturbation |
31 | Kun Liu 0001, Hillol Kargupta, Jessica Ryan |
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. |
IEEE Trans. Knowl. Data Eng. |
2006 |
DBLP DOI BibTeX RDF |
multiplicative data perturbation, privacy preserving data mining, Random projection |
31 | Yanping Chen 0002 |
Uniform convergence analysis of finite difference approximations for singular perturbation problems on an adapted grid. |
Adv. Comput. Math. |
2006 |
DBLP DOI BibTeX RDF |
moving mesh, error estimate, singular perturbation, rate of convergence |
31 | David Jonathan Coffin, Christopher D. Clack |
gLINC: identifying composability using group perturbation. |
GECCO |
2006 |
DBLP DOI BibTeX RDF |
genetic algorithms, composition, hierarchical, perturbation, epistasis, linkage learning |
31 | Ioannis Ch. Paschalidis, Yong Liu, Christos G. Cassandras, Christos G. Panayiotou |
Inventory Control for Supply Chains with Service Level Constraints: A Synergy between Large Deviations and Perturbation Analysis. |
Ann. Oper. Res. |
2004 |
DBLP DOI BibTeX RDF |
supply chain management, large deviations, perturbation analysis, inventory control, service levels |
31 | Xi-Ren Cao |
From Perturbation Analysis to Markov Decision Processes and Reinforcement Learning. |
Discret. Event Dyn. Syst. |
2003 |
DBLP DOI BibTeX RDF |
gradient-based policy iteration, perturbation realization, TD(), Q-learning, Poisson equations, Potentials |
31 | Krishnamurty Muralidhar, Rathindra Sarathy |
A theoretical basis for perturbation methods. |
Stat. Comput. |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
31 | Beresford N. Parlett |
Perturbation of Eigenpairs of Factored Symmetric Tridiagonal Matrices. |
Found. Comput. Math. |
2003 |
DBLP DOI BibTeX RDF |
AMS Classification, Primary, 6540, Secondary, 1525, Eigenvalues, Perturbation, Tridiagonal |
31 | Yong Liu 0013, Weibo Gong |
Perturbation Analysis for Stochastic Fluid Queueing Systems. |
Discret. Event Dyn. Syst. |
2002 |
DBLP DOI BibTeX RDF |
congestion control, perturbation analysis, network pricing |
31 | G. Ivan Maldonado, Naveen Kondapalli |
Online Higher-Order Error Correction of Nonlinear Diffusion Generalized Perturbation Theory Using Neural Networks. |
J. Supercomput. |
2002 |
DBLP DOI BibTeX RDF |
neural networks, perturbation theory, diffusion theory |
31 | Yiming Wei 0001, Hebing Wu |
Challenging Problems on the Perturbation of Drazin Inverse. |
Ann. Oper. Res. |
2001 |
DBLP DOI BibTeX RDF |
Drazin inverse, group inverse, perturbation bound, index, condition number |
31 | Bernd Heidergott |
Infinitesimal perturbation analysis for queueing networks with general service time distributions. |
Queueing Syst. Theory Appl. |
1999 |
DBLP DOI BibTeX RDF |
simulation, queueing theory, perturbation analysis, sample path analysis |
31 | Thien M. Ha, Horst Bunke |
Off-Line, Handwritten Numeral Recognition by Perturbation Method. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1997 |
DBLP DOI BibTeX RDF |
Writing habits and styles, writing instruments, reversing process, perturbation method, decision combination, k-nearest neighbor rule, neural networks |
31 | Michael C. Fu 0001, Jian-Qiang Hu |
Smoothed perturbation analysis for queues with finite buffers. |
Queueing Syst. Theory Appl. |
1993 |
DBLP DOI BibTeX RDF |
finite buffer queues, simulation, Perturbation analysis, sample path analysis |
31 | Steven J. Zeil |
Perturbation Techniques for Detecting Domain Errors. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
sensitivity measures, individual test points, domain errors, perturbing functions, potential faults, standard optimization techniques, novel test-data-generation method, arithmetic fault detection, perturbation techniques, software testing, error detection, error detection, program testing, test set, vector space, arithmetic expressions |
29 | Suyun Zhao, Eric C. C. Tsang, Degang Chen 0002 |
The Model of Fuzzy Variable Precision Rough Sets. |
IEEE Trans. Fuzzy Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Paolo Maffezzoni |
Unified Computation of Parameter Sensitivity and Signal-Injection Sensitivity in Nonlinear Oscillators. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5810 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|