BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
analysi (7)
random (6)
use (6)
base (5)
test (4)

Stem perturb$ (all stems)

38 papers:

ICMLICML-2015-CohenH #learning #online
Following the Perturbed Leader for Online Structured Learning (AC, TH), pp. 1034–1042.
ICSEICSE-v2-2015-Imparato #android #testing #user interface
A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps (GI), pp. 760–762.
ICMLICML-c1-2014-OrabonaHSJ #on the #random
On Measure Concentration of Random Maximum A-Posteriori Perturbations (FO, TH, ADS, TSJ), pp. 432–440.
KDIRKDIR-2014-DomeniconiMMP #ontology #random
Discovering New Gene Functionalities from Random Perturbations of Known Gene Ontological Annotations (GD, MM, GM, PP), pp. 107–116.
ICSEICSE-2014-SuR #analysis #empirical #parametricity #probability
Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICDARICDAR-2013-YinZWL #consistency #recognition
Style Consistent Perturbation for Handwritten Chinese Character Recognition (FY, MKZ, QFW, CLL), pp. 1051–1055.
ICMLICML-c3-2013-RamanJSS #learning
Stable Coactive Learning via Perturbation (KR, TJ, PS, TS), pp. 837–845.
DATEDATE-2012-Brenner
VLSI legalization with minimum perturbation by iterative augmentation (UB), pp. 1385–1390.
ICALPICALP-v1-2012-BalcanL #clustering
Clustering under Perturbation Resilience (MFB, YL), pp. 63–74.
CIKMCIKM-2012-XueKRKP #network #random #social
Delineating social network data anonymization via random edge perturbation (MX, PK, CR, PK, HKP), pp. 475–484.
ICMLICML-2012-HazanJ #on the #random
On the Partition Function and Random Maximum A-Posteriori Perturbations (TH, TSJ), p. 217.
ICPRICPR-2012-GuiST #analysis #estimation #parametricity
Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
DRRDRR-2011-ChenCL #constraints #identification #using
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
SACSAC-2010-ChakrabartiCGM #analysis #linear #privacy
Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
SACSAC-2010-DelisVT #approach #classification
A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
ISSTAISSTA-2010-TangBLS #analysis #float #statistics
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
PODSPODS-2009-RastogiHMS #privacy #query
Relationship privacy: output perturbation for queries with joins (VR, MH, GM, DS), pp. 107–116.
VLDBVLDB-2009-XiaoTC #multi #privacy #random
Optimal Random Perturbation at Multiple Privacy Levels (XX, YT, MC), pp. 814–825.
DACDAC-2008-Hurst #automation #logic #synthesis
Automatic synthesis of clock gating logic with controlled netlist perturbation (APH), pp. 654–657.
VLDBVLDB-2008-XiaoT #query
Output perturbation with query relaxation (XX, YT), pp. 857–869.
SEKESEKE-2008-FilhoV #testing #using #web #web service #xml
Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
DACDAC-2007-ZhouTLW #how #logic
How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs (CLZ, WCT, WHL, YLW), pp. 922–927.
STOCSTOC-2007-VuT #matrix
The condition number of a randomly perturbed matrix (VHV, TT), pp. 248–255.
HPCAHPCA-2007-RacunasCMM #fault
Perturbation-based Fault Screening (PR, KC, SM, SSM), pp. 169–180.
ICALPICALP-v1-2006-MehlhornOS #geometry #performance #reliability
Reliable and Efficient Computational Geometry Via Controlled Perturbation (KM, RO, MS), pp. 299–310.
SACSAC-2006-AtzoriBGP #towards
Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
ICMLICML-2005-GeurtsW #modelling
Closed-form dual perturb and combine for tree-based models (PG, LW), pp. 233–240.
DATEDATE-2001-CheungWC #clustering #logic #using
Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
DATEDATE-2001-NeauMR #complexity #using
Low complexity FIR filters using factorization of perturbed coefficients (CN, KM, KR), pp. 268–272.
LICSLICS-2001-AsarinB #hybrid #turing machine
Perturbed Turing Machines and Hybrid Systems (EA, AB), pp. 269–278.
ICPRICPR-v2-2000-Zhao00a #analysis #performance
Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
DACDAC-1999-SaxenaL #using
Crosstalk Minimization Using Wire Perturbations (PS, CLL), pp. 100–103.
ISSTAISSTA-1996-MorellM #analysis #testing #using
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
ICDARICDAR-1993-YasudaYY #correlation #recognition
Effect of the perturbed correlation method for optical character recognition (MY, KY, HY), pp. 830–833.
PPoPPPPoPP-1993-SarukkaiM #analysis #source code
Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
PPoPPPPoPP-1991-Malony #case study #performance
Event-Based Performance Perturbation: A Case Study (ADM), pp. 201–212.
DACDAC-1988-ChaoG #fault #modelling
Micro-operation Perturbations in Chip Level Fault Modeling (CHC, FGG), pp. 579–582.
ICSEICSE-1984-Zeil #fault #testing
Perturbation Testing for Computation Errors (SJZ), pp. 257–265.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.