Academic literature on the topic 'Functional bootstrapping'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Functional bootstrapping.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Functional bootstrapping"
Sharipov, Olimjon Sh, and Martin Wendler. "Bootstrapping covariance operators of functional time series." Journal of Nonparametric Statistics 32, no. 3 (June 1, 2020): 648–66. http://dx.doi.org/10.1080/10485252.2020.1771334.
Full textShang, Han Lin. "Bootstrapping Long-Run Covariance of Stationary Functional Time Series." Forecasting 6, no. 1 (February 5, 2024): 138–51. http://dx.doi.org/10.3390/forecast6010008.
Full textBeutner, Eric, and Henryk Zähle. "Bootstrapping Average Value at Risk of Single and Collective Risks." Risks 6, no. 3 (September 12, 2018): 96. http://dx.doi.org/10.3390/risks6030096.
Full textOkada, Hiroki, Shinsaku Kiyomoto, and Carlos Cid. "Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics." Information 12, no. 8 (July 26, 2021): 297. http://dx.doi.org/10.3390/info12080297.
Full textRondal, Jean A., and Anne Cession. "Input evidence regarding the semantic bootstrapping hypothesis." Journal of Child Language 17, no. 3 (October 1990): 711–17. http://dx.doi.org/10.1017/s0305000900010965.
Full textShang, Han Lin. "Double bootstrapping for visualizing the distribution of descriptive statistics of functional data." Journal of Statistical Computation and Simulation 91, no. 10 (February 10, 2021): 2116–32. http://dx.doi.org/10.1080/00949655.2021.1885670.
Full textSilaban, Daniel Ebenezer, and Irsad Lubis. "BOOTSTRAPPING ANALYSIS OF NORTH SUMATRA PROVINCE INSPECTORATE PERFORMANCE." Jurnal Riset Bisnis dan Manajemen 16, no. 1 (February 22, 2023): 83–90. http://dx.doi.org/10.23969/jrbm.v16i1.7228.
Full textBrodal, Gerth Stølting, and Chris Okasaki. "Optimal purely functional priority queues." Journal of Functional Programming 6, no. 6 (November 1996): 839–57. http://dx.doi.org/10.1017/s095679680000201x.
Full textLÖFQVIST, LARS. "PRODUCT INNOVATION IN SMALL COMPANIES: MANAGING RESOURCE SCARCITY THROUGH FINANCIAL BOOTSTRAPPING." International Journal of Innovation Management 21, no. 02 (February 2017): 1750020. http://dx.doi.org/10.1142/s1363919617500207.
Full textDar, Davood, Lionel Lacombe, and Neepa T. Maitra. "The exact exchange–correlation potential in time-dependent density functional theory: Choreographing electrons with steps and peaks." Chemical Physics Reviews 3, no. 3 (September 2022): 031307. http://dx.doi.org/10.1063/5.0096627.
Full textDissertations / Theses on the topic "Functional bootstrapping"
Zhan, Yihui. "Bootstrapping functional M-estimators /." Thesis, Connect to this title online; UW restricted, 1996. http://hdl.handle.net/1773/8958.
Full textClet, Pierre-Emmanuel. "Contributions to the optimization of TFHE's functional bootstrapping for the evaluation of non-polynomial operators." Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASG001.
Full textIn recent years, concerns about sensitive and personal data arose due to the increasing creation and use of digital data. New laws, such as the General Data Protection Regulation, have been introduced to ensure that the confidentiality of individuals' data is respected. However, the growing outsourcing of data processing, particularly with the emergence of "machine learning as a service", raises the following question: is it possible to let a third party process our data while keeping it confidential?One solution to this problem comes in the form of Fully Homomorphic Encryption, or FHE for short. Using FHE cryptosystems, operations can be applied directly to encrypted messages, without ever revealing either the original message or the message resulting from the operations. In theory, this collection of techniques makes it possible to externalise calculations without compromising on the confidentiality of the data used during these calculations.This could pave the way for numerous applications, such as the possibility of offering online medical diagnostic services while ensuring the total confidentiality of the patients' medical data.Despite this promise, the high computational cost of FHE operators limits their practical scope. A calculation on encrypted data can take several million times longer than its equivalent on non-encrypted data. This makes it unthinkable to evaluate highly time consuming algorithms on encrypted data. In addition, the memory cost of FHE encryption is several thousand times greater than unencrypted data. This overhead may prove to be prohibitive for applications on low-memory systems such as embedded systems.In this thesis we develop a new primitive for computing on encrypted data based on the "functional bootstrapping" operation supported by the TFHE cryptosystem. This primitive allows a gain in latency and memory compared to other comparable techniques in the state of the art. We are also introducing a second primitive enabling calculations to be performed in the form of a logic circuit, providing a significant gain in calculation speed compared with the state of the art. This approach could be of particular interest to designers of homomorphic compilers as an alternative to the use of binary encryption.These two tools are intended to be sufficiently generic to be applicable to a wide range of use cases and are therefore not limited to the use cases presented in this manuscript.As an illustration, we apply our operators to the confidential computation of outsourced neural networks, thus demonstrating the possibility of evaluating neural networks with relatively low latency, even in the case of recurrent neural networks.Finally, we apply our operators to a technique known as transciphering, making it possible to overcome memory limitation on the client side coming with the large size of FHE ciphertexts
Kumbhare, Deepak. "3D FUNCTIONAL MODELING OF DBS EFFICACY AND DEVELOPMENT OF ANALYTICAL TOOLS TO EXPLORE FUNCTIONAL STN." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/2531.
Full textKleyn, Judith. "The performance of the preliminary test estimator under different loss functions." Thesis, University of Pretoria, 2014. http://hdl.handle.net/2263/43132.
Full textThesis (PhD)--University of Pretoria, 2014.
lk2014
Statistics
PhD
Unrestricted
Cardozo, Sandra Vergara. "Função da probabilidade da seleção do recurso (RSPF) na seleção de habitat usando modelos de escolha discreta." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/11/11134/tde-11032009-143806/.
Full textIn ecology, the behavior of animals is often studied to better understand their preferences for different types of habitat and food. The present work is concerned with this topic. It is divided into three chapters. The first concerns the estimation of a resource selection probability function (RSPF) compared with a discrete choice model (DCM) using chi-squared to obtain estimates. The best estimates were obtained by the DCM method. Nevertheless, animals were not selected based on choice alone. With RSPF, the maximum likelihood estimates used with the logistic regression still did not reach the objectives, since the animals have more than one choice. R and Minitab software and the FORTRAN programming language were used for the computations in this chapter. The second chapter discusses further the likelihood presented in the first chapter. A new likelihood for a RSPF is presented, which takes into account the units used and not used, and parametric and non-parametric bootstrapping are employed to study the bias and variance of parameter estimators, using a FORTRAN program for the calculations. In the third chapter, the new likelihood presented in chapter 2, with a discrete choice model is used to resolve a part of the problem presented in the first chapter. A nested structure is proposed for modelling selection by 28 spotted owls (Strix occidentalis) as well as a generalized nested logit model using random utility maximization and a random RSPF. Numerical optimization methods and the SAS system were employed to estimate the nested structural parameters.
Wu, Mengjiao. "Equivalence testing for identity authentication using pulse waves from photoplethysmograph." Diss., 2019. http://hdl.handle.net/2097/39461.
Full textDepartment of Statistics
Suzanne Dubnicka
Christopher Vahl
Photoplethysmograph sensors use a light-based technology to sense the rate of blood flow as controlled by the heart’s pumping action. This allows for a graphical display of a patient’s pulse wave form and the description of its key features. A person’s pulse wave has been proposed as a tool in a wide variety of applications. For example, it could be used to diagnose the cause of coldness felt in the extremities or to measure stress levels while performing certain tasks. It could also be applied to quantify the risk of heart disease in the general population. In the present work, we explore its use for identity authentication. First, we visualize the pulse waves from individual patients using functional boxplots which assess the overall behavior and identify unusual observations. Functional boxplots are also shown to be helpful in preprocessing the data by shifting individual pulse waves to a proper starting point. We then employ functional analysis of variance (FANOVA) and permutation tests to demonstrate that the identities of a group of subjects could be differentiated and compared by their pulse wave forms. One of the primary tasks of the project is to confirm the identity of a person, i.e., we must decide if a given person is whom they claim to be. We used an equivalence test to determine whether the pulse wave of the person under verification and the actual person were close enough to be considered equivalent. A nonparametric bootstrap functional equivalence test was applied to evaluate equivalence by constructing point-wise confidence intervals for the metric of identity assurance. We also proposed new testing procedures, including the way of building the equivalence hypothesis and test statistics, determination of evaluation range and equivalence bands, to authenticate the identity.
Chen, Li-Jie, and 陳立杰. "A Bootstrapping Approach to Cluster Analysis for Gene Expression Data with Incorporation of Gene Functional Similarity." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/72309351459073201386.
Full text國立臺南大學
資訊工程學系碩士班
103
This thesis addressed the problem of incorporating gene semantic similarity into cluster analysis of gene expression data. The purpose was to effectively enhance the biological relevance of the clustering results by simultaneously considering the two features transformed from the gene expression data and gene functional annotations. The key issue of this problem was then on the determination of appropriate feature weights. The method proposed by past related studies needed to manually adjust the feature weights to select the best results. This thesis proposed an automatic feature-weights-determination clustering algorithm that integrated bootstrap and K-medoids methods for clustering gene expression data. The proposed method was validated by applying the method to two sets of frequently used real-life experimental gene expression data of budding yeast Saccharomyces cerevisiae obtained from past related studies. The results were analyzed and compared with the method proposed by past related studies using three well-known external criteria for clustering evaluation. The results indicated that the proposed algorithm can produce comparable or more valid gene expression clustering results than the method proposed by past related studies.
Jabbari, Arfaee Shahab. "Bootstrap Learning of Heuristic Functions." Master's thesis, 2010. http://hdl.handle.net/10048/1589.
Full textRoach, Lisa Aretha Nyala. "Temporal Variations in the Compliance of Gas Hydrate Formations." Thesis, 2012. http://hdl.handle.net/1807/44081.
Full textBooks on the topic "Functional bootstrapping"
McMurry, Timothy, and Dimitris Politis. Resampling methods for functional data. Edited by Frédéric Ferraty and Yves Romain. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780199568444.013.7.
Full textCheng, Russell. Bootstrap Analysis. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198505044.003.0004.
Full textBook chapters on the topic "Functional bootstrapping"
Okada, Hiroki, Shinsaku Kiyomoto, and Carlos Cid. "Integerwise Functional Bootstrapping on TFHE." In Lecture Notes in Computer Science, 107–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8_7.
Full textLi, Zhihao, Benqiang Wei, Ruida Wang, Xianhui Lu, and Kunpeng Wang. "Full Domain Functional Bootstrapping with Least Significant Bit Encoding." In Information Security and Cryptology, 203–23. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0942-7_11.
Full textBendoukha, Adda-Akram, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey. "Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping." In Data and Applications Security and Privacy XXXVII, 91–109. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37586-6_6.
Full textClet, Pierre-Emmanuel, Aymen Boudguiga, Renaud Sirdey, and Martin Zuber. "ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain." In Progress in Cryptology - AFRICACRYPT 2023, 317–43. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37679-5_14.
Full textLiu, Zeyu, and Yunhao Wang. "Amortized Functional Bootstrapping in Less than 7 ms, with $$\tilde{O}(1)$$ Polynomial Multiplications." In Advances in Cryptology – ASIACRYPT 2023, 101–32. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8736-8_4.
Full textCsörgő, Miklós, Sándor Csörgő, and Lajos Horváth. "Bootstrapping Empirical Functions." In An Asymptotic Theory for Empirical Reliability and Concentration Processes, 150–64. New York, NY: Springer New York, 1986. http://dx.doi.org/10.1007/978-1-4615-6420-1_17.
Full textApplebaum, Benny. "Bootstrapping Obfuscators via Fast Pseudorandom Functions." In Lecture Notes in Computer Science, 162–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45608-8_9.
Full textRomero, Alejandro, Francisco Bellas, Jose A. Becerra, and Richard J. Duro. "Bootstrapping Autonomous Skill Learning in the MDB Cognitive Architecture." In Understanding the Brain Function and Emotions, 120–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19591-5_13.
Full textYang, Kaifeng, and Michael Affenzeller. "Surrogate-assisted Multi-objective Optimization via Genetic Programming Based Symbolic Regression." In Lecture Notes in Computer Science, 176–90. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27250-9_13.
Full textGeelen, Robin, Ilia Iliashenko, Jiayi Kang, and Frederik Vercauteren. "On Polynomial Functions Modulo $$p^e$$ and Faster Bootstrapping for Homomorphic Encryption." In Advances in Cryptology – EUROCRYPT 2023, 257–86. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30620-4_9.
Full textConference papers on the topic "Functional bootstrapping"
"Bootstrapping functional data: a study of distributional property of sample eigenvalues." In 19th International Congress on Modelling and Simulation. Modelling and Simulation Society of Australia and New Zealand (MSSANZ), Inc., 2011. http://dx.doi.org/10.36334/modsim.2011.aa.shang.
Full textWeiss, Benjamin M., Joshua M. Hamel, Mark A. Ganter, and Duane W. Storti. "Data-Driven Additive Manufacturing Constraints for Topology Optimization." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85391.
Full textPage, Alvaro, Noelia López, William Ricardo Venegas, and Pilar Serra. "Comparación de la normalización lineal de la escala de tiempos con el registro funcional continuo en movimientos cíclicos del cuello." In 11 Simposio CEA de Bioingeniería. València: Editorial Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/ceabioing.2019.10027.
Full textVahdat, Kimia, and Sara Shashaani. "Non-Parametric Uncertainty Bias and Variance Estimation via Nested Bootstrapping and Influence Functions." In 2021 Winter Simulation Conference (WSC). IEEE, 2021. http://dx.doi.org/10.1109/wsc52266.2021.9715420.
Full textLuo, Zhenjun, and Jian S. Dai. "Patterned Bootstrap: A New Method Which Gives Efficiency for Precision Position Synthesis of Planar Linkages." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84658.
Full textWei, Hua, Deheng Ye, Zhao Liu, Hao Wu, Bo Yuan, Qiang Fu, Wei Yang, and Zhenhui Li. "Boosting Offline Reinforcement Learning with Residual Generative Modeling." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/492.
Full textLacaze, Sylvain, and Samy Missoum. "A Generalized “Max-Min” Sample for Reliability Assessment With Dependent Variables." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34051.
Full textVoeikova, Maria D. "MORPHONOLOGICAL PROPERTIES OF NOUNS WITH -KA ELEMENT IN THE FINAL PART." In 49th International Philological Conference in Memory of Professor Ludmila Verbitskaya (1936–2019). St. Petersburg State University, 2022. http://dx.doi.org/10.21638/11701/9785288062353.13.
Full textZeng, Zizhen, Shanpu Shen, Bo Wang, Johan J. Estrada-Lopez, Ross Murch, and Edgar Sanchez-Sinencio. "An Ultra-low-power Power Management Circuit with Output Bootstrapping and Reverse Leakage Reduction Function for RF Energy Harvesting." In 2020 IEEE/MTT-S International Microwave Symposium (IMS). IEEE, 2020. http://dx.doi.org/10.1109/ims30576.2020.9224098.
Full textZheng, Zheng, Hui Li, and Mengqi Wang. "Application of a 3D Discrete Ordinates-Monte Carlo Coupling Method on CAP1400 Cavity Streaming Calculation." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66401.
Full text