Improved Decay Tolerant Inference of Previously Uninstalled Computer Applications
نویسندگان
چکیده
منابع مشابه
Review of the Applications of Exponential Family in Statistical Inference
In this paper, after introducing exponential family and a history of work done by researchers in the field of statistics, some applications of this family in statistical inference especially in estimation problem,statistical hypothesis testing and statistical information theory concepts will be discussed.
متن کاملImproved viability of previously frozen platelets.
The main feature of this new approach to platelet freezing is a controlled rate of addition and postthaw removal of 5#{176}/odimethylsulfoxide (DMSO). When DMSO was removed from fresh nonfrozen platelet concentrates before transfusion, no adverse effect on posttransfusion survival was observed. The 51Cr recovery of autologous fresh platelet concentrates in vivo was 65#{176}/o ± 5#{176}/o, while...
متن کاملImproved Generalization via Tolerant Training
Theoretical and computational justiication is given for improved generalization when the training set is learned with less accuracy. The model used for this investigation is a simple linear one. It is shown that learning a training set with a tolerance improves generalization, over zero-tolerance training, for any testing set satisfying a certain closeness condition to the training set. These r...
متن کاملImproved Purely Additive Fault - Tolerant
Let G be an unweighted n-node undirected graph. A βadditive spanner of G is a spanning subgraph H of G such that distances in H are stretched at most by an additive term β w.r.t. the corresponding distances in G. A natural research goal related with spanners is that of designing sparse spanners with low stretch. In this paper, we focus on fault-tolerant additive spanners, namely additive spanne...
متن کاملBuilding Intrusion-Tolerant Applications
The ITTC project (Intrusion Tolerance via Threshold Cryptography) provides tools and an infrastructure for building intrusion tolerant applications. Rather than prevent intrusions or detect them after the fact, the ITTC system ensures that the compromise of a few system components does not compromise sensitive security information. To do so we protect cryptographic keys by distributing them acr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Digital Forensics, Security and Law
سال: 2019
ISSN: 1558-7223
DOI: 10.15394/jdfsl.2019.1626