Factor theory

Results: 988



#Item
61Graphical models / NP-complete problems / Coding theory / Belief propagation / Probability theory / Factor graph / Graph partition / Ear decomposition / Distributed computing / Matching / Graph coloring / RochaThatte cycle detection algorithm

Distributed Parallel Inference on Large Factor Graphs Joseph E. Gonzalez Carnegie Mellon University

Add to Reading List

Source URL: select.cs.cmu.edu

Language: English - Date: 2009-08-13 03:47:05
62Economy / Finance / Money / Mathematical finance / Capital asset pricing model / Risk factor / Alpha / Factor theory / Untradable assets

The International CAPM Redux Francesca Brusa (Oxford) Tarun Ramadorai (Oxford and CEPR) Adrien Verdelhan (MIT Sloan and NBER) March 2015

Add to Reading List

Source URL: www.q-group.org

Language: English - Date: 2016-01-28 18:04:24
63Probability theory / Markov models / Tree decomposition / Markov blanket / Kalman filter / Line graph / Matrix / Belief propagation

Nonlinear Factor Recovery for Long-Term SLAM Mladen Mazuran Wolfram Burgard Gian Diego Tipaldi

Add to Reading List

Source URL: europa2.informatik.uni-freiburg.de

Language: English - Date: 2015-10-12 05:06:30
64Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:29:05
65Statistics / Parametric statistics / Estimation theory / Statistical theory / Statistical tests / Regression analysis / Emotions / Trust / Linear regression / Analysis of variance / G factor

Evaluating perceived trust from procedurally animated gaze - Supplementary Materials Aline Normoyle, Jeremy B. Badler, Teresa Fan, Norman I. Badler University of Pennsylvania Vinicius J. Cassol, Soraia R. Musse † Ponti

Add to Reading List

Source URL: www.alinenormoyle.com

Language: English - Date: 2013-09-08 16:06:01
66Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:42:08
67

Charles Spearman William Revelle Northwestern University Charles Spearmanwas the leading psychometrician of the early 20th century. His work on the classical test theory, factor analysis, and the g theory of

Add to Reading List

Source URL: personality-project.org

Language: English - Date: 2014-03-02 12:04:16
    68Statistics / Hypothesis testing / Statistical theory / Principal component analysis / KolmogorovSmirnov test / Null hypothesis / Factor analysis / Statistical hypothesis testing / False discovery rate / Null / P-value / Multiple comparisons problem

    BIOINFORMATICS ORIGINAL PAPER Gene expression

    Add to Reading List

    Source URL: bioinformatics.oxfordjournals.org

    Language: English
    69Statistics / Regression analysis / Statistical models / Forms of government / Estimation theory / Consociationalism / Logistic regression / Scott Gates / Proportional hazards model / Factor analysis / Binary number / Dummy variable

    Powersharing, Protection, and Peace Scott Gates, Benjamin A. T. Graham, Yonatan Lupu Håvard Strand, Kaare W. Strøm September 17, 2015

    Add to Reading List

    Source URL: yonatanlupu.com

    Language: English - Date: 2015-09-17 13:55:13
    70Multivariate statistics / Bioinformatics / Matrix theory / Factor analysis / Matrices / SPSS / Hierarchical clustering / Cluster analysis / Matrix / Distance matrix / Co-occurrence matrix / Similarity measure

    Research Paper The reflection of hierarchical cluster analysis of co-occurrence matrices in SPSS Qiuju ZHOU1, Fuhai LENG1† & Loet LEYDESDORFF2 National Science Library, Chinese Academy of Sciences, Beijing, Chi

    Add to Reading List

    Source URL: 159.226.100.150

    Language: English - Date: 2015-08-18 06:47:22
    UPDATE