نتایج جستجو برای: bogus metric

تعداد نتایج: 82175  

2015
Tobias Wüchner Martín Ochoa Alexander Pretschner

We present a novel malware detection approach based on metrics over quantitative data flow graphs. Quantitative data flow graphs (QDFGs) model process behavior by interpreting issued system calls as aggregations of quantifiable data flows. Due to the high abstraction level we consider QDFG metric based detection more robust against typical behavior obfuscation like bogus call injection or call ...

2015
Larry Wasserman

The problem is that when we prove theorems about our methods, we make all kinds of assumptions. The assumptions are often highly implausible. The practitioners use the method and they have a false sense of security since some theoretician has proved that works. The theoretician is too detached from real data analysis to realize that his assumptions are bogus. The practitioner does not have the ...

Journal: :Monthly Notices of the Royal Astronomical Society 2022

ABSTRACT Developing an effective automatic classifier to separate genuine sources from artifacts is essential for transient follow-ups in wide-field optical surveys. The identification of detections the subtraction after image differencing process a key step such classifiers, known as real-bogus classification problem. We apply self-supervised machine learning model, deep-embedded self-organizi...

2016
Virgil Zeigler-Hill Marion T. Wallace Erin M. Myers

Black individuals consistently report the highest levels of self-esteem of any racial group in the United States. The present study utilized the bogus pipeline procedure (i.e., the use of physiological equipment that ostensibly allows the researcher to detect if individuals are lying) to examine whether impression management plays a role in the relatively high levels of self-esteem that are rep...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ولی عصر (عج) - رفسنجان - دانشکده ریاضی و کامپیوتر 1389

in this thesis we will present three topics. we define approximate fixed points in fuzzy normed spaces. also we obtain some necessary and sufficient conditions on the existence of? -fixed points for ? > 0. at the continue some results about approximate fixed points for a class of non-expansive maps on g-metric spaces are obtained and we define approximate fixed points in partial metric spa...

2018

The Public Key Infrastructure (PKI) protects users from malicious man-in-the-middle attacks by having trusted Certificate Authorities (CAs) vouch for the identity of servers on the internet through digitally signed certificates. Ironically, the mechanism CAs use to issue certificates is itself vulnerable to man-in-the-middle attacks by network-level adversaries. Autonomous Systems (ASes) can ex...

2013
Shobhana S

Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as sink) through an established routing path. Wireless sensor networks are usually deployed a...

2017
Mashallah Narimani Mehdi Dadkhah

In recent years, academic publishing has been faced with many destructive phenomena. “Predatory publishers” (or journals) are one challenge for scholarly publishing. This term was introduced to academic societies for the first time by Jeffrey Beall in 2010 (1). A predatory journal is a journal which publishes papers without peer review, or by an unfair review process and charging publication fe...

Journal: :Psychophysiology 2017
Steven J Luck Nicholas Gaspelin

ERP experiments generate massive datasets, often containing thousands of values for each participant, even after averaging. The richness of these datasets can be very useful in testing sophisticated hypotheses, but this richness also creates many opportunities to obtain effects that are statistically significant but do not reflect true differences among groups or conditions (bogus effects). The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید