38 papers:
- ICML-2015-CohenH #learning #online
- Following the Perturbed Leader for Online Structured Learning (AC, TH), pp. 1034–1042.
- ICSE-v2-2015-Imparato #android #testing #user interface
- A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps (GI), pp. 760–762.
- ICML-c1-2014-OrabonaHSJ #on the #random
- On Measure Concentration of Random Maximum A-Posteriori Perturbations (FO, TH, ADS, TSJ), pp. 432–440.
- KDIR-2014-DomeniconiMMP #ontology #random
- Discovering New Gene Functionalities from Random Perturbations of Known Gene Ontological Annotations (GD, MM, GM, PP), pp. 107–116.
- ICSE-2014-SuR #analysis #empirical #parametricity #probability
- Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
- ICDAR-2013-YinZWL #consistency #recognition
- Style Consistent Perturbation for Handwritten Chinese Character Recognition (FY, MKZ, QFW, CLL), pp. 1051–1055.
- ICML-c3-2013-RamanJSS #learning
- Stable Coactive Learning via Perturbation (KR, TJ, PS, TS), pp. 837–845.
- DATE-2012-Brenner
- VLSI legalization with minimum perturbation by iterative augmentation (UB), pp. 1385–1390.
- ICALP-v1-2012-BalcanL #clustering
- Clustering under Perturbation Resilience (MFB, YL), pp. 63–74.
- CIKM-2012-XueKRKP #network #random #social
- Delineating social network data anonymization via random edge perturbation (MX, PK, CR, PK, HKP), pp. 475–484.
- ICML-2012-HazanJ #on the #random
- On the Partition Function and Random Maximum A-Posteriori Perturbations (TH, TSJ), p. 217.
- ICPR-2012-GuiST #analysis #estimation #parametricity
- Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
- DRR-2011-ChenCL #constraints #identification #using
- Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
- SAC-2010-ChakrabartiCGM #analysis #linear #privacy
- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
- SAC-2010-DelisVT #approach #classification
- A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
- ISSTA-2010-TangBLS #analysis #float #statistics
- Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
- PODS-2009-RastogiHMS #privacy #query
- Relationship privacy: output perturbation for queries with joins (VR, MH, GM, DS), pp. 107–116.
- VLDB-2009-XiaoTC #multi #privacy #random
- Optimal Random Perturbation at Multiple Privacy Levels (XX, YT, MC), pp. 814–825.
- DAC-2008-Hurst #automation #logic #synthesis
- Automatic synthesis of clock gating logic with controlled netlist perturbation (APH), pp. 654–657.
- VLDB-2008-XiaoT #query
- Output perturbation with query relaxation (XX, YT), pp. 857–869.
- SEKE-2008-FilhoV #testing #using #web #web service #xml
- Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
- DAC-2007-ZhouTLW #how #logic
- How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs (CLZ, WCT, WHL, YLW), pp. 922–927.
- STOC-2007-VuT #matrix
- The condition number of a randomly perturbed matrix (VHV, TT), pp. 248–255.
- HPCA-2007-RacunasCMM #fault
- Perturbation-based Fault Screening (PR, KC, SM, SSM), pp. 169–180.
- ICALP-v1-2006-MehlhornOS #geometry #performance #reliability
- Reliable and Efficient Computational Geometry Via Controlled Perturbation (KM, RO, MS), pp. 299–310.
- SAC-2006-AtzoriBGP #towards
- Towards low-perturbation anonymity preserving pattern discovery (MA, FB, FG, DP), pp. 588–592.
- ICML-2005-GeurtsW #modelling
- Closed-form dual perturb and combine for tree-based models (PG, LW), pp. 233–240.
- DATE-2001-CheungWC #clustering #logic #using
- Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
- DATE-2001-NeauMR #complexity #using
- Low complexity FIR filters using factorization of perturbed coefficients (CN, KM, KR), pp. 268–272.
- LICS-2001-AsarinB #hybrid #turing machine
- Perturbed Turing Machines and Hybrid Systems (EA, AB), pp. 269–278.
- ICPR-v2-2000-Zhao00a #analysis #performance
- Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
- DAC-1999-SaxenaL #using
- Crosstalk Minimization Using Wire Perturbations (PS, CLL), pp. 100–103.
- ISSTA-1996-MorellM #analysis #testing #using
- Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
- ICDAR-1993-YasudaYY #correlation #recognition
- Effect of the perturbed correlation method for optical character recognition (MY, KY, HY), pp. 830–833.
- PPoPP-1993-SarukkaiM #analysis #source code
- Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
- PPoPP-1991-Malony #case study #performance
- Event-Based Performance Perturbation: A Case Study (ADM), pp. 201–212.
- DAC-1988-ChaoG #fault #modelling
- Micro-operation Perturbations in Chip Level Fault Modeling (CHC, FGG), pp. 579–582.
- ICSE-1984-Zeil #fault #testing
- Perturbation Testing for Computation Errors (SJZ), pp. 257–265.