Showing 20 of 613 papers

The Complex Gradient Operator and the CR-Calculus

Ken Kreutz-Delgado
2009
2 references

A thorough discussion and development of the calculus of real-valued functions of complex-valued vectors is given using the framework of the Wirtinger Calculus. The presented material is suitable for exposition in an introductory Electrical Engineeri...

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation

Michael E. Kounavis, Frank L. Berry
2008
2 references

A framework for designing a family of novel fast cyclic redundancy code (CRC) generation algorithms is presented. Our algorithms can ideally read arbitrarily large amounts of data at a time, while optimizing their memory requirement to meet the const...

On Linear DETs.

Jiri Navractil, D. Klusacek
2007
2 references

This paper investigates the properties of a popular ROC variant - the detection error trade-off plot (DET). In particular, we derive a set of conditions on the underlying probability distributions to produce linear DET plots in a generalized setting....

Practical type inference for arbitrary-rank types

Simon Peyton Jones, Dimitrios Vytiniotis, Stephanie Weirich, Mark Shields
2007
2 references

Abstract Haskell's popularity has driven the need for ever more expressive type system features, most of which threaten the decidability and practicality of Damas-Milner type inference. One such feature is the ability to write functions with higher-r...

Strictly Proper Scoring Rules, Prediction, and Estimation

Tilmann Gneiting, Adrian E. Raftery
2007
2 references

Scoring rules assess the quality of probabilistic forecasts, by assigning a numerical score based on the predictive distribution and on the event or value that materializes. A scoring rule is proper if the forecaster maximizes the expected score for ...

Label Propagation and Quadratic Criterion.

Yoshua Bengio, Delalleau Olivier, Roux Nicolas Le
2006
2 references

Abstract This chapter shows how the different graph-based algorithms for semi-supervised learning can be cast into a common framework where one minimizes a quadratic cost criterion whose closed-form solution is found by solving a linear system of siz...

Less hashing, same performance: Building a better Bloom filter

Adam Kirsch, Michael Mitzenmacher
2006
2 references

Abstract A standard technique from the hashing literature is to use two hash functions h 1 ( x ) and h 2 ( x ) to simulate additional hash functions of the form g i ( x ) = h 1 ( x ) + i h 2 ( x ). We demonstrate that this technique can be usefully a...

Spam Filtering with Naive Bayes - Which Naive Bayes?

V. Metsis, Ion Androutsopoulos, G. Paliouras
2006
2 references

Training linear SVMs in linear time.

Thorsten Joachims
2006
2 references

Linear Support Vector Machines (SVMs) have become one of the most prominent machine learning techniques for high-dimensional sparse data commonly encountered in applications like text classification, word-sense disambiguation, and drug design. These ...

Cuckoo hashing.

Rasmus Pagh, Flemming Friche Rodler
2004
2 references

Least angle regression

2004
2 references

The purpose of model selection algorithms such as All Subsets, Forward Selection and Backward Elimination is to choose a linear model on the basis of the same set of data to which the model will be applied. Typically we have available a large collect...

Learning to Find Pre-Images.

Gökhan Aydýnlý, Wolfgang Härdle, Bernd Rönz
2003
2 references

Travel arrangements and flight ticket booking via internet is widely used nowadays and follow already certain standards. Although increasing activity for multimedia/web education components can be observed, we are far away from standards in this impo...

Xorshift RNGs

George Marsaglia
2003
2 references

Description of a class of simple, extremely fast random number generators (RNGs) with periods 2k - 1 for k = 32, 64, 96, 128, 160, 192. These RNGs seem to pass tests of randomness very well.

32-bit cyclic redundancy codes for Internet applications

P. Koopman
2002
2 references

Standardized 32-bit Cyclic Redundancy Codes provide fewer bits of guaranteed error detection than they could, achieving a Hamming Distance (HD) of only 4 for maximum-length Ethernet messages, whereas HD=6 is possible. Although research has revealed i...

Finding frequent items in data streams

Moses Charikar, Kevin Chen, Martı́n Farach-Colton
2002
2 references

Small sample corrections for LTS and MCD

Greet Pison, Stefan Van Aelst, Gert Willems
2002
2 references

The least trimmed squares estimator and the minimum covariance determinant estimator Rousseeuw (1984) are frequently used robust estimators of regression and of location and scatter. Consistency factors can be computed for both methods to make the es...

Stochastic gradient boosting

J. Friedman
2002
2 references

Missing value estimation methods for DNA microarrays.

Olga G. Troyanskaya, Michael Cantor, Gavin Sherlock, Pat Brown, Trevor Hastie, Robert Tibshirani, Da...
2001
2 references

Abstract Motivation: Gene expression microarray experiments can generate data sets with multiple missing expression values. Unfortunately, many algorithms for gene expression analysis require a complete matrix of gene array values as input. For examp...

Special Invited Paper-Additive logistic regression: A statistical view of boosting

J. Friedman
2000
2 references

Boosting is one of the most important recent developments in\nclassification methodology. Boosting works by sequentially applying a\nclassification algorithm to reweighted versions of the training data and then\ntaking a weighted majority vote of the...