Detection theory

Results: 1119



#Item
561Reinforcement / Philosophy of mind / Matching law / Stimulus control / Experimental analysis of behavior / Detection theory / Behaviorism / Philosophy of psychology / Behavior

JOURNAL OF THE EXPERIMENTAL ANALYSIS OF BEHAVIOR 1979, 32, [removed]NUMBER

Add to Reading List

Source URL: www.dareassociation.org

Language: English - Date: 2014-04-10 18:29:44
562Detection theory / Receiver operating characteristic / Socioeconomics / Statistical classification / Economic model / Statistics / Biostatistics / Data mining

A VARIABLE SENSITIVITY THEORY OF SIGNAL DETECTION by Richard C. Atkinson TECHNICAL REPORT NO. 47 May 18, 1962

Add to Reading List

Source URL: suppes-corpus.stanford.edu

Language: English - Date: 2008-10-21 19:36:03
563Information retrieval / Computational linguistics / N-gram / Stemming / Document retrieval / Error detection and correction / Information theory / Science / Information science / Natural language processing

Corrupted Queries in Spanish Text Retrieval: Error ∗ Correction vs. N-Grams Juan Otero Jesús Vilares

Add to Reading List

Source URL: www.grupocole.org

Language: English - Date: 2008-11-13 07:06:26
564Theoretical computer science / Hamming code / Covering code / Hamming / Covering radius / Linear code / Standard array / Coding theory / Error detection and correction / Mathematics

1326 IEEE TRANSACTIONS ON COMPUTERS, VOL. 47, NO. 12, DECEMBER 1998 Partial-Sum Queries in OLAP Data Cubes Using Covering Codes

Add to Reading List

Source URL: authors.library.caltech.edu

Language: English - Date: 2012-12-26 04:13:41
565Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
566Algorithm / Code / Dynamic programming / Finite-state machine / Systems theory / Applied mathematics / Mathematics / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.cs.mun.ca

Language: English - Date: 2006-03-20 11:52:22
567Information / Mathematics / Telecommunications engineering / Noisy-channel coding theorem / Binary symmetric channel / Forward error correction / Typoglycemia / Error-correcting codes with feedback / Coding theory / Error detection and correction / Information theory

Microsoft PowerPoint - ECC DC.ppt

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2007-11-13 22:21:45
568Music theory / Tonality / Consonance and dissonance / Diatonic function / Major chord / Major and minor / Added tone chord / Jamshed Bharucha / Music / Harmony / Chords

Perception & Psychophysic s 2002, 64 (4), [removed]Effect of harmonic relatedness on the detection of temporal asynchronies BARBARA TILLMANN and JAMSHED J. BHARUCHA

Add to Reading List

Source URL: ase.tufts.edu

Language: English - Date: 2009-06-16 12:40:04
569Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
570Low-density parity-check code / Computing / Information / Intel / Open NAND Flash Interface Working Group / Error detection and correction / Coding theory / Computer hardware

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda

Add to Reading List

Source URL: www.flashmemorysummit.com

Language: English - Date: 2011-08-29 11:30:41
UPDATE