|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1261 occurrences of 825 keywords
|
|
|
Results
Found 5810 publication records. Showing 5810 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
82 | Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney |
Understanding Measurement Perturbation in Trace-based Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-6, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Stefan Funke, Christian Klein 0001, Kurt Mehlhorn, Susanne Schmitt |
Controlled perturbation for Delaunay triangulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2005, Vancouver, British Columbia, Canada, January 23-25, 2005, pp. 1047-1056, 2005, SIAM, 0-89871-585-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
controlled perturbation, oating point computation, randomized incremental construction, delaunay triangulations, convex hulls, randomized incremental algorithm |
74 | Zhipeng Lü, Jin-Kao Hao |
A Critical Element-Guided Perturbation Strategy for Iterated Local Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoCOP ![In: Evolutionary Computation in Combinatorial Optimization, 9th European Conference, EvoCOP 2009, Tübingen, Germany, April 15-17, 2009. Proceedings, pp. 1-12, 2009, Springer, 978-3-642-01008-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
perturbation operator, critical element-guided perturbation, course timetabling, graph coloring, iterated local search |
72 | Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su 0001 |
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, ISSTA 2010, Trento, Italy, July 12-16, 2010, pp. 131-142, 2010, ACM, 978-1-60558-823-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
testing, stability, floating-point, perturbation, numerical code |
67 | Everardo Gutiérrez, Carlos A. Brizuela |
ILS-Perturbation Based on Local Optima Structure for the QAP Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2006: Advances in Artificial Intelligence, 5th Mexican International Conference on Artificial Intelligence, Apizaco, Mexico, November 13-17, 2006, Proceedings, pp. 404-414, 2006, Springer, 3-540-49026-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Big Valley, Perturbation Length, Quadratic Assignment Problem, Iterated Local Search |
67 | Jeff Offutt, Wuzhi Xu |
Generating test cases for web services using data perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 29(5), pp. 1-10, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
web services, XML, SOAP, data perturbation |
67 | Jintai Ding |
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 305-318, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
open-key, perturbation, multivariable, quadratic polynomials |
60 | Dan Halperin, Eran Leiserowitz |
Controlled perturbation for arrangements of circles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCG ![In: Proceedings of the 19th ACM Symposium on Computational Geometry, San Diego, CA, USA, June 8-10, 2003, pp. 264-273, 2003, ACM, 1-58113-663-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
robustness, arrangements, perturbation |
60 | Naim Ben-Hamida, Khaled Saab 0001, David Marche, Bozena Kaminska |
A perturbation based fault modeling and simulation for mixed-signal circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 6th Asian Test Symposium (ATS '97), 17-18 November 1997, Akita, Japan, pp. 182-187, 1997, IEEE Computer Society, 0-8186-8209-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
analog circuit fault simulation, perturbation fault model, fault abstraction, structural fault modeling, perturbation estimation, fault observation, hierarchical analog fault simulator, complexity, test generation, CMOS, mixed-signal circuits, mixed analogue-digital integrated circuits, functional fault modeling, physical defects |
53 | Sheng Zhong 0002, Zhiqiang Yang |
Guided perturbation: towards private and accurate mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 17(5), pp. 1165-1177, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Steven Y. Ko, Indranil Gupta |
Perturbation-Resistant and Overlay-Independent Resource Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings, pp. 248-257, 2005, IEEE Computer Society, 0-7695-2282-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yaron Rachlin, Katharina Probst, Rayid Ghani |
Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers, pp. 92-110, 2008, Springer, 978-3-642-01717-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Noise perturbation, privacy, anonymity, statistical disclosure control |
53 | Vivien Dubois, Louis Granboulan, Jacques Stern |
Cryptanalysis of HFE with Internal Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 249-265, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE |
52 | Allen D. Malony, Daniel A. Reed, Harry A. G. Wijshoff |
Performance Measurement Intrusion and Perturbation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 3(4), pp. 433-450, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
instrumentation perturbations, softwareevent tracing, Alliant FX/80 vector multiprocessor, true performance, instrumentedexecution, instrumentation coverage, source level instrumentation, hardwareinteractions, performance evaluation, parallel programming, performance measurement, perturbation analysis, perturbation theory |
50 | Somnath Chakrabarti, Zhiyuan Chen 0003, Aryya Gangopadhyay, Shibnath Mukherjee |
Privacy preserving linear discriminant analysis from perturbed data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 610-615, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
50 | Shipra Agrawal 0001, Jayant R. Haritsa, B. Aditya Prakash |
FRAPP: a framework for high-accuracy privacy-preserving mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 18(1), pp. 101-139, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data mining, Privacy |
50 | Shipra Agrawal 0001, Jayant R. Haritsa |
A Framework for High-Accuracy Privacy-Preserving Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 193-204, 2005, IEEE Computer Society, 0-7695-2285-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 383-397, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
46 | Jun Liu, Xiangqian Liu, Xiaoli Ma |
First-Order Perturbation Analysis of Singular Vectors in Singular Value Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 56(7-1), pp. 3044-3049, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Wee Seng Chua, Chau Yuen, Francois P. S. Chin |
A Continuous Vector-Perturbation for Multi-Antenna Multi-User Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 1806-1810, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | J. C. E. van der Burg, L. J. R. Casius, Idsart Kingma, Jaap H. van Dieën, Arthur J. van Soest |
Factors underlying the perturbation resistance of the trunk in the first part of a lifting movement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biol. Cybern. ![In: Biol. Cybern. 93(1), pp. 54-62, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Muscle dynamics, Perturbations, Lifting, Forward simulation |
46 | Paulito P. Palmes, Shiro Usui |
The Influence of Gaussian, Uniform, and Cauchy Perturbation Functions in the Neural Network Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP ![In: Neural Information Processing, 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004, Proceedings, pp. 199-204, 2004, Springer, 3-540-23931-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Branson W. Murrill, Larry J. Morell, Erika Olimpiew |
A Perturbation-based Testing Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2-4 December 2002, Greenbelt, MD, USA, pp. 145-152, 2002, IEEE Computer Society, 0-7695-1757-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Magdy A. El-Tawil |
The Homotopy Wiener-Hermite Expansion and Perturbation Technique (WHEP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science I, pp. 159-180, 2008, Springer, 978-3-540-79298-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Non-linear stochastic differential equations, Wiener-Hermite expansion, WHEP technique, Homotopy perturbation |
46 | Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii |
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 148-164, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
piece in hand concept, perturbation vector, public key cryptosystem, multivariate polynomial, multivariate public key cryptosystem |
46 | Xiao-Bai Li, Sumit Sarkar |
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(9), pp. 1278-1283, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, Privacy, kd-trees, microaggregation, data perturbation |
46 | S. P. Chan |
A Robust Control Law with Estimated Perturbation Compensation for Robot Manipulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 36(3), pp. 265-283, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
perturbation compensation, equivalent control, robot manipulators, sliding mode, variable structure control |
46 | Min Chen, James Arvo |
Theory and application of specular path perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 19(4), pp. 246-278, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
implicit surfaces, optics, specular reflection, Taylor series, perturbation theory |
46 | S. P. Chan |
Variable Structure Control of Robot Manipulators with Perturbation Estimator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 26(1), pp. 29-46, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
perturbation compensation, system uncertainties, robot manipulators, sliding mode, variable structure control |
46 | Visvanathan Ramesh, Robert M. Haralick |
Random perturbation models for boundary extraction sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Vis. Appl. ![In: Mach. Vis. Appl. 9(5/6), pp. 229-239, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Random perturbation models, Boundary extraction sequence, Computer vision algorithms, Performance characterization |
43 | Manish Airy, Sandeep Bhadra, Robert W. Heath Jr., Sanjay Shakkottai |
Transmit Precoding for the Multiple Antenna Broadcast Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC Spring 2006, 7-10 May 2006, Melbourne, Australia, pp. 1396-1400, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Jim Dowd, Shouhuai Xu, Weining Zhang |
Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 145-159, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data mining, decision tree, Privacy-preservation, matrix, perturbation |
43 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 290-301, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
43 | Xi-Ren Cao |
A new method of performance sensitivity analysis for non-Markovian queueing networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 10(4), pp. 313-350, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Realization factors, perturbation analysis, convergence properties |
41 | Bertrand M. Hochwald, Christian B. Peel, A. Lee Swindlehurst |
A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 53(3), pp. 537-544, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Aurél Galántai |
Problems and Results in Matrix Perturbation Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Towards Intelligent Engineering and Information Technology ![In: Towards Intelligent Engineering and Information Technology, pp. 37-53, 2009, Springer, 978-3-642-03736-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Manuel Lozano 0001, Carlos García-Martínez |
An Evolutionary ILS-Perturbation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hybrid Metaheuristics ![In: Hybrid Metaheuristics, 5th International Workshop, HM 2008, Málaga, Spain, October 8-9, 2008. Proceedings, pp. 1-15, 2008, Springer, 978-3-540-88438-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Li Liu, Bhavani Thuraisingham |
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 507-512, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Lourival F. Júnior de Almeida, Silvia Regina Vergilio |
Exploring Perturbation Based Testing for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 717-726, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Zhi-Hua Zhou, Yang Yu 0001 |
Ensembling local learners ThroughMultimodal perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 35(4), pp. 725-735, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Luping Chen, John H. R. May, Gordon Hughes |
A Constant Perturbation Method for Evaluation of Structural Diversity in Multiversion Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 63-73, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
39 | Larry J. Morell, Branson W. Murrill |
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 1996 International Symposium on Software Testing and Analysis, ISSTA 1996, San Diego, CA, USA, January 8-10, 1996, pp. 92-97, 1996, ACM, 0-89791-787-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
38 | Victor Milenkovic, Elisha Sacks, Min-Ho Kyung |
Robust Minkowski sums of polyhedra via controlled linear perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Solid and Physical Modeling ![In: ACM Symposium on Solid and Physical Modeling, Proceedings of the 15th ACM Symposium on Solid and Physical Modeling, SPM 2010, Haifa, Israel, September 1-3, 2010, pp. 23-30, 2010, ACM, 978-1-60558-984-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
perturbation methods, robust computational geometry |
38 | Martin R. Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz |
Attacking cryptographic schemes based on "perturbation polynomials". ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 1-10, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
pairwise key establishment, random perturbation polynomial, sensor network security |
38 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Eigth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2009, June 19 - July 1, 2009, Providence, Rhode Island, USA, pp. 107-116, 2009, ACM, 978-1-60558-553-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
38 | Willard Frutiger, Jeremy Collins, Wei Hu |
Using Random Perturbation Method to Improve Efficacy Prediction of siRNA Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (1) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 1, pp. 194-199, 2008, IEEE Computer Society, 978-0-7695-3118-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
siRNA, linear model, random perturbation |
38 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 288-301, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
38 | Jordi Castro 0001 |
Computational Experiments with Minimum-Distance Controlled Perturbation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings, pp. 73-86, 2004, Springer, 3-540-22118-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
controlled perturbation methods, linear programming, quadratic programming, statistical disclosure control |
38 | Haimonti Dutta, Hillol Kargupta, Souptik Datta, Krishnamoorthy Sivakumar |
Analysis of privacy preserving random perturbation techniques: further explorations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 31-38, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, privacy, random-perturbation |
38 | Wenliang Du, Aditya P. Mathur |
Testing for Software Vulnerability Using Environment Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 603-612, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
environment perturbation, fault injection, Security testing, security flaws |
38 | Krishnamurty Muralidhar, Rathindra Sarathy |
Security of Random Data Perturbation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 24(4), pp. 487-493, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
random data perturbation, bias, covariance, noise addition |
38 | Patrick Tendick, Norman S. Matloff |
A Modified Random Perturbation Method for Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 19(1), pp. 47-63, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
random perturbation method, correlation, bias, noise addition |
36 | Daofeng Xu, Yongming Huang, Luxi Yang |
Improved nonlinear multiuser precoding using lattice reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 3(1), pp. 47-52, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multiuser precoding, MIMO, Lattice reduction |
36 | Yongming Huang, Daofeng Xu, Luxi Yang, Yinggang Du, Bin Li |
Limited Feedback Precoding Based on Hierarchical Codebook and Linear Receiver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 4749-4753, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Hazem N. Nounou, Mohamed N. Nounou |
Resilient adaptive control of uncertain time-delay systems - a delay-dependent approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: Proceedings of the 47th IEEE Conference on Decision and Control, CDC 2008, December 9-11, 2008, Cancún, Mexico, pp. 4001-4006, 2008, IEEE, 978-1-4244-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | SangJoo Kwon, KwangWoong Yang, Sangdeok Park |
An Effective Kalman Filter Localization Method for Mobile Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China, pp. 1524-1529, 2006, IEEE, 1-4244-0258-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Arturo Forner-Cordero, H. F. J. M. Koopman, Frans C. T. van der Helm |
Mechanical model of the recovery from stumbling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Biol. Cybern. ![In: Biol. Cybern. 91(4), pp. 212-220, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Zhouchen Lin, Heung-Yeung Shum |
Response to the Comments on "Fundamental Limits of Reconstruction-Based Superresolution Algorithms under Local Translation'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 28(5), pp. 847, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
reconstruction-based algorithms, Superresolution, perturbation theory |
36 | Shalabh Bhatnagar |
Adaptive multivariate three-timescale stochastic approximation algorithms for simulation based optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 15(1), pp. 74-107, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Adaptive three-timescale stochastic approximation algorithms, Newton-type algorithms, simultaneous perturbation stochastic approximation, simulation optimization |
31 | Debasri Saha, Susmita Sur-Kolay |
Encoding of Floorplans through Deterministic Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: VLSI Design 2009: Improving Productivity through Higher Abstraction, The 22nd International Conference on VLSI Design, New Delhi, India, 5-9 January 2009, pp. 315-320, 2009, IEEE Computer Society, 978-0-7695-3506-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Yupu Hu, Baocang Wang, Wencai He |
NTRUSign With a New Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(7), pp. 3216-3221, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Feng Wan, Wei-Ping Zhu 0001, M. N. S. Swamy |
Perturbation analysis of subspace-based semi-blind MIMO channel estimation approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 129-132, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | He Zhang, Wai Kin Chan |
Mathematical programming-based perturbation analysis for GI/G/1 queues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference, WSC 2007, Washington, DC, USA, December 9-12, 2007, pp. 553-559, 2007, WSC, 1-4244-1306-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Catherine L. Zhou, Wai-Chung Tang, Wing-Hang Lo, Yu-Liang Wu |
How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, June 4-8, 2007, pp. 922-927, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ping Zhao 0004, Chun Zhao, Peter G. Casazza |
Perturbation of Regular Sampling in Shift-Invariant Spaces for Frames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(10), pp. 4643-4648, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Tobias Andersson Granberg |
Solving the flight perturbation problem with meta heuristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Heuristics ![In: J. Heuristics 12(1-2), pp. 37-53, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Aircraft recovery, Irregular operations, Operational airline scheduling, Simulated annealing, Tabu search, Path relinking |
31 | Keke Chen, Ling Liu 0001 |
Privacy Preserving Data Classification with Rotation Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pp. 589-592, 2005, IEEE Computer Society, 0-7695-2278-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Yufei Zhou, Herbert H. C. Iu, Chi Kong Tse, Jun-Ning Chen |
Controlling chaos in DC/DC converters using optimal resonant parametric perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 2481-2484, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Nikolai D. Christov, Michail M. Konstantinov, Petko Hr. Petkov |
New Perturbation Bounds for the Continuous-Time H infinity-Optimization Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAA ![In: Numerical Analysis and Its Applications, Third International Conference, NAA 2004, Rousse, Bulgaria, June 29 - July 3, 2004, Revised Selected Papers, pp. 232-239, 2004, Springer, 3-540-24937-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Wen-Yi Zhao |
Performance Perturbation Analysis of Eigen-Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 2105-2108, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Claude-Pierre Jeannerod |
An algorithm for the eigenvalue perturbation problem: reduction of a -matrix to a Lidskii matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Proceedings of the 2000 International Symposium on Symbolic and Algebraic Computation, ISSAC 2000, St. Andrews, United Kingdom, August 6-10, 2000, pp. 184-191, 2000, ACM, 1-58113-218-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | William Hendrix, Matthew C. Schmidt, Paul Breimyer, Nagiza F. Samatova |
On perturbation theory and an algorithm for maximal clique enumeration in uncertain and noisy graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on Knowledge Discovery from Uncertain Data ![In: Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data, Paris, France, June 28, 2009, pp. 48-56, 2009, ACM, 978-1-60558-675-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
graph perturbation theory, maximal clique enumeration, graph algorithms, biological applications |
31 | Lei Su, Hongzhi Liao, Zhengtao Yu 0001, Jiahua Tang |
Semi-supervised Learning with Multimodal Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (1) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part I, pp. 651-660, 2009, Springer, 978-3-642-01506-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multimodal Perturbation, Machine Learning, Semi-Supervised Learning, Ensemble Learning, Co-training |
31 | Houde Han, Zhongyi Huang, R. Bruce Kellogg |
A Tailored Finite Point Method for a Singular Perturbation Problem on an Unbounded Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 36(2), pp. 243-261, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tailored finite point method, Singular perturbation problem, Unbounded domain, Artificial boundary condition |
31 | Jesús Aransay, Clemens Ballarin, Julio Rubio 0001 |
A Mechanized Proof of the Basic Perturbation Lemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 40(4), pp. 271-292, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Homological algebra, Basic perturbation lemma, Isabelle |
31 | Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo |
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008, pp. 449-450, 2008, ACM, 978-1-60558-073-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pairwise key establishment, sensor network security, random perturbation |
31 | Dong-Jun Bang, Tae-Gun Jeong |
Perturbation Analysis of the Combination Resonances of a Thin Cantilever Beam under Vertical Excitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part I, pp. 576-586, 2008, Springer, 978-3-540-69838-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Parametric Excitation, Mathieu Equation, Method of Multiple Scales, Combination Resonance, Perturbation Analysis, Stability Criterion |
31 | Mario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy |
A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 127-138, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tail Dependence, Copula, Data Perturbation, Data Masking |
31 | Hiroyasu Nagata, Jin Yoshimura, Kei-ichi Tainaka |
A Slight Delay in the Onset of Conservation May Bring about an Abrupt Increase of Extinction Risk: Perturbation Experiments in an Ecological Lattice Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 8th International Conference on Cellular Aotomata for Reseach and Industry, ACRI 2008, Yokohama, Japan, September 23-26, 2008. Proceedings, pp. 362-367, 2008, Springer, 978-3-540-79991-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fluctuation enhancement(FE), perturbation experiment (PE), local interaction(LI), global interaction(GI), contact process(CP) |
31 | Wensheng Zhang 0001, Minh Tran, Sencun Zhu, Guohong Cao |
A random perturbation-based scheme for pairwise key establishment in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007, pp. 90-99, 2007, ACM, 978-1-59593-684-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pairwise key establishment, polynomial, sensor network security, random perturbation |
31 | Otis Brooks |
Solving discrete resource allocation problems using the Simultaneous Perturbation Stochastic Approximation (SPSA) algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim (3) ![In: Proceedings of the 2007 Spring Simulation Multiconference, SpringSim 2007, Norfolk, Virginia, USA, March 25-29, 2007, Volume 3, pp. 55-62, 2007, SCS/ACM, 1-56555-314-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
discrete stochastic optimization, simultaneous perturbation stochastic approximation, resource allocation |
31 | Yifen Lai, Shuili Chen |
On the Perturbation of Fuzzy Matrix Equations with v-T Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFIE ![In: Fuzzy Information and Engineering, Proceedings of the Second International Conference of Fuzzy Information and Engineering, ICFIE 2007, May 13-16, 2007, Guangzhou, China, pp. 269-279, 2007, Springer, 978-3-540-71440-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fuzzy matrix equation, Perturbation, Solution |
31 | Li Chen, Dmitry B. Goldgof, Lawrence O. Hall, Steven Eschrich |
Noise-Based Feature Perturbation as a Selection Method for Microarray Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBRA ![In: Bioinformatics Research and Applications, Third International Symposium, ISBRA 2007, Atlanta, GA, USA, May 7-10, 2007, Proceedings, pp. 237-247, 2007, Springer, 978-3-540-72030-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Feature perturbation, microarray gene expression data, classification, gene selection |
31 | Nazni Farooq, Xu Huang 0001, Dharmendra Sharma 0001 |
Multi-agent Processing for Query Camouflage Via Data Perturbation in Online Medical Surveys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 950-958, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
query camouflage system, online medical survey, multi-agent, data perturbation |
31 | Kun Liu 0001, Hillol Kargupta, Jessica Ryan |
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(1), pp. 92-106, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multiplicative data perturbation, privacy preserving data mining, Random projection |
31 | Yanping Chen 0002 |
Uniform convergence analysis of finite difference approximations for singular perturbation problems on an adapted grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. Math. ![In: Adv. Comput. Math. 24(1-4), pp. 197-212, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
moving mesh, error estimate, singular perturbation, rate of convergence |
31 | David Jonathan Coffin, Christopher D. Clack |
gLINC: identifying composability using group perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006, pp. 1133-1140, 2006, ACM, 1-59593-186-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
genetic algorithms, composition, hierarchical, perturbation, epistasis, linkage learning |
31 | Ioannis Ch. Paschalidis, Yong Liu, Christos G. Cassandras, Christos G. Panayiotou |
Inventory Control for Supply Chains with Service Level Constraints: A Synergy between Large Deviations and Perturbation Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 126(1-4), pp. 231-258, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
supply chain management, large deviations, perturbation analysis, inventory control, service levels |
31 | Xi-Ren Cao |
From Perturbation Analysis to Markov Decision Processes and Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Event Dyn. Syst. ![In: Discret. Event Dyn. Syst. 13(1-2), pp. 9-39, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
gradient-based policy iteration, perturbation realization, TD(), Q-learning, Poisson equations, Potentials |
31 | Krishnamurty Muralidhar, Rathindra Sarathy |
A theoretical basis for perturbation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Comput. ![In: Stat. Comput. 13(4), pp. 329-335, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
statistical disclosure limitation, confidentiality, perturbation, disclosure risk, data masking |
31 | Beresford N. Parlett |
Perturbation of Eigenpairs of Factored Symmetric Tridiagonal Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Found. Comput. Math. ![In: Found. Comput. Math. 3(2), pp. 207-223, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
AMS Classification, Primary, 6540, Secondary, 1525, Eigenvalues, Perturbation, Tridiagonal |
31 | Yong Liu 0013, Weibo Gong |
Perturbation Analysis for Stochastic Fluid Queueing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Event Dyn. Syst. ![In: Discret. Event Dyn. Syst. 12(4), pp. 391-416, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
congestion control, perturbation analysis, network pricing |
31 | G. Ivan Maldonado, Naveen Kondapalli |
Online Higher-Order Error Correction of Nonlinear Diffusion Generalized Perturbation Theory Using Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 23(2), pp. 185-192, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
neural networks, perturbation theory, diffusion theory |
31 | Yiming Wei 0001, Hebing Wu |
Challenging Problems on the Perturbation of Drazin Inverse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 103(1-4), pp. 371-378, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Drazin inverse, group inverse, perturbation bound, index, condition number |
31 | Bernd Heidergott |
Infinitesimal perturbation analysis for queueing networks with general service time distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 31(1-2), pp. 43-58, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
simulation, queueing theory, perturbation analysis, sample path analysis |
31 | Thien M. Ha, Horst Bunke |
Off-Line, Handwritten Numeral Recognition by Perturbation Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 19(5), pp. 535-539, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Writing habits and styles, writing instruments, reversing process, perturbation method, decision combination, k-nearest neighbor rule, neural networks |
31 | Michael C. Fu 0001, Jian-Qiang Hu |
Smoothed perturbation analysis for queues with finite buffers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 14(1-2), pp. 57-78, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
finite buffer queues, simulation, Perturbation analysis, sample path analysis |
31 | Steven J. Zeil |
Perturbation Techniques for Detecting Domain Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(6), pp. 737-746, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
sensitivity measures, individual test points, domain errors, perturbing functions, potential faults, standard optimization techniques, novel test-data-generation method, arithmetic fault detection, perturbation techniques, software testing, error detection, error detection, program testing, test set, vector space, arithmetic expressions |
29 | Suyun Zhao, Eric C. C. Tsang, Degang Chen 0002 |
The Model of Fuzzy Variable Precision Rough Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 17(2), pp. 451-467, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Paolo Maffezzoni |
Unified Computation of Parameter Sensitivity and Signal-Injection Sensitivity in Nonlinear Oscillators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 27(5), pp. 781-790, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5810 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|