Algorithm

Results: 17634



#Item
911Statistics / Estimation theory / Computational statistics / Cluster analysis / Gibbs sampling / Markov chain Monte Carlo / Expectationmaximization algorithm / Consensus clustering / Likelihood function / Sampling

Robust Entity Clustering via Phylogenetic Inference Nicholas Andrews and Jason Eisner and Mark Dredze Department of Computer Science and Human Language Technology Center of Excellence Johns Hopkins University 3400 N. Cha

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2014-05-16 20:46:24
912Computing / Mathematics / Computer programming / Data compression / LZ77 and LZ78 / Lossless compression / Code / Algorithm / Huffman coding / Trie / String / LempelZivWelch

Zips: Mining Compressing Sequential Patterns in Streams Hoang Thanh Lam Toon Calders Jie Yang

Add to Reading List

Source URL: poloclub.gatech.edu

Language: English - Date: 2013-07-08 06:02:58
913Statistics / Statistical theory / Monte Carlo methods / Markov chain Monte Carlo / Markov models / Stochastic simulation / Estimation theory / MetropolisHastings algorithm / Gibbs sampling / Markov chain / Maximum likelihood estimation / Importance sampling

Network Analysis and Modeling, CSCI 5352 LectureProf. Aaron Clauset

Add to Reading List

Source URL: tuvalu.santafe.edu

Language: English - Date: 2013-11-23 11:09:20
914Statistics / Estimation theory / Markov models / Cluster analysis / Control theory / Expectationmaximization algorithm / Missing data / Kalman filter / Mixture model / Hierarchical clustering / Image segmentation / K-means clustering

1606 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 35,

Add to Reading List

Source URL: eceweb.ucsd.edu

Language: English - Date: 2015-07-31 19:00:24
915Mathematics / Mathematical analysis / Theory of computation / Combinatorial optimization / Matching / Linear programming / Approximation algorithm / Permutation / Measure theory / operator

Online Bipartite Matching with Random Arrivals: An Approach Based on Strongly Factor-Revealing LPs ∗ Mohammad Mahdian

Add to Reading List

Source URL: www.qiqiyan.com.s3-website-us-east-1.amazonaws.com

Language: English - Date: 2012-07-04 18:28:36
916Mathematical analysis / Mathematics / Logarithms / Mathematical model / Algorithm / Pi / Principles and Standards for School Mathematics / Mathematical economics

Microsoft Word - G4 Math Standards 08.doc

Add to Reading List

Source URL: www.ped.state.nm.us

Language: English - Date: 2016-06-25 18:47:19
917Statistics / Machine learning / Probability / Statistical models / Graphical models / Bayesian statistics / Markov networks / Statistical relational learning / Probabilistic soft logic / Markov random field / Structured prediction / Expectationmaximization algorithm

ABSTRACT Title of dissertation: HINGE-LOSS MARKOV RANDOM FIELDS AND PROBABILISTIC SOFT LOGIC:

Add to Reading List

Source URL: stephenbach.net

Language: English - Date: 2015-10-08 14:59:19
918Graph theory / Mathematics / Network flow / Graph connectivity / Combinatorial optimization / Routing algorithms / Matching / FordFulkerson algorithm / Maximum flow problem / Flow network / Cut / Graph

Algorithms and Data Structures Winter TermExercises for UnitIn a basketball tournament n teams play against each other (possibly multiple times) in a pre-determined sequence. The winner of a game gets one

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-20 15:51:01
919Computing / Concurrent computing / Computer programming / Concurrent data structure / Ctrie / Data parallelism / Automatic parallelization / Thank You / Algorithm / Linearizability

Data Structures and Algorithms for Data-Parallel Computing in a Managed Runtime THIS IS A TEMPORARY TITLE PAGE It will be replaced for the final print by a version provided by the service academique.

Add to Reading List

Source URL: axel22.github.io

Language: English - Date: 2016-08-13 13:11:44
920Cryptography / Initialization vector / Authenticated encryption / Stream cipher / Symmetric-key algorithm / Cipher / Chosen-plaintext attack / Advantage / Padding / Data Encryption Standard / Cryptographic nonce / Block cipher mode of operation

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Viet Tung Hoang1,2 Reza Reyhanitabar3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-26 02:21:29
UPDATE