Literatura académica sobre el tema "Functional bootstrapping"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Functional bootstrapping".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Functional bootstrapping"
Sharipov, Olimjon Sh y Martin Wendler. "Bootstrapping covariance operators of functional time series". Journal of Nonparametric Statistics 32, n.º 3 (1 de junio de 2020): 648–66. http://dx.doi.org/10.1080/10485252.2020.1771334.
Texto completoShang, Han Lin. "Bootstrapping Long-Run Covariance of Stationary Functional Time Series". Forecasting 6, n.º 1 (5 de febrero de 2024): 138–51. http://dx.doi.org/10.3390/forecast6010008.
Texto completoBeutner, Eric y Henryk Zähle. "Bootstrapping Average Value at Risk of Single and Collective Risks". Risks 6, n.º 3 (12 de septiembre de 2018): 96. http://dx.doi.org/10.3390/risks6030096.
Texto completoOkada, Hiroki, Shinsaku Kiyomoto y Carlos Cid. "Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics". Information 12, n.º 8 (26 de julio de 2021): 297. http://dx.doi.org/10.3390/info12080297.
Texto completoRondal, Jean A. y Anne Cession. "Input evidence regarding the semantic bootstrapping hypothesis". Journal of Child Language 17, n.º 3 (octubre de 1990): 711–17. http://dx.doi.org/10.1017/s0305000900010965.
Texto completoShang, Han Lin. "Double bootstrapping for visualizing the distribution of descriptive statistics of functional data". Journal of Statistical Computation and Simulation 91, n.º 10 (10 de febrero de 2021): 2116–32. http://dx.doi.org/10.1080/00949655.2021.1885670.
Texto completoSilaban, Daniel Ebenezer y Irsad Lubis. "BOOTSTRAPPING ANALYSIS OF NORTH SUMATRA PROVINCE INSPECTORATE PERFORMANCE". Jurnal Riset Bisnis dan Manajemen 16, n.º 1 (22 de febrero de 2023): 83–90. http://dx.doi.org/10.23969/jrbm.v16i1.7228.
Texto completoBrodal, Gerth Stølting y Chris Okasaki. "Optimal purely functional priority queues". Journal of Functional Programming 6, n.º 6 (noviembre de 1996): 839–57. http://dx.doi.org/10.1017/s095679680000201x.
Texto completoLÖFQVIST, LARS. "PRODUCT INNOVATION IN SMALL COMPANIES: MANAGING RESOURCE SCARCITY THROUGH FINANCIAL BOOTSTRAPPING". International Journal of Innovation Management 21, n.º 02 (febrero de 2017): 1750020. http://dx.doi.org/10.1142/s1363919617500207.
Texto completoDar, Davood, Lionel Lacombe y Neepa T. Maitra. "The exact exchange–correlation potential in time-dependent density functional theory: Choreographing electrons with steps and peaks". Chemical Physics Reviews 3, n.º 3 (septiembre de 2022): 031307. http://dx.doi.org/10.1063/5.0096627.
Texto completoTesis sobre el tema "Functional bootstrapping"
Zhan, Yihui. "Bootstrapping functional M-estimators /". Thesis, Connect to this title online; UW restricted, 1996. http://hdl.handle.net/1773/8958.
Texto completoClet, Pierre-Emmanuel. "Contributions to the optimization of TFHE's functional bootstrapping for the evaluation of non-polynomial operators". Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASG001.
Texto completoIn recent years, concerns about sensitive and personal data arose due to the increasing creation and use of digital data. New laws, such as the General Data Protection Regulation, have been introduced to ensure that the confidentiality of individuals' data is respected. However, the growing outsourcing of data processing, particularly with the emergence of "machine learning as a service", raises the following question: is it possible to let a third party process our data while keeping it confidential?One solution to this problem comes in the form of Fully Homomorphic Encryption, or FHE for short. Using FHE cryptosystems, operations can be applied directly to encrypted messages, without ever revealing either the original message or the message resulting from the operations. In theory, this collection of techniques makes it possible to externalise calculations without compromising on the confidentiality of the data used during these calculations.This could pave the way for numerous applications, such as the possibility of offering online medical diagnostic services while ensuring the total confidentiality of the patients' medical data.Despite this promise, the high computational cost of FHE operators limits their practical scope. A calculation on encrypted data can take several million times longer than its equivalent on non-encrypted data. This makes it unthinkable to evaluate highly time consuming algorithms on encrypted data. In addition, the memory cost of FHE encryption is several thousand times greater than unencrypted data. This overhead may prove to be prohibitive for applications on low-memory systems such as embedded systems.In this thesis we develop a new primitive for computing on encrypted data based on the "functional bootstrapping" operation supported by the TFHE cryptosystem. This primitive allows a gain in latency and memory compared to other comparable techniques in the state of the art. We are also introducing a second primitive enabling calculations to be performed in the form of a logic circuit, providing a significant gain in calculation speed compared with the state of the art. This approach could be of particular interest to designers of homomorphic compilers as an alternative to the use of binary encryption.These two tools are intended to be sufficiently generic to be applicable to a wide range of use cases and are therefore not limited to the use cases presented in this manuscript.As an illustration, we apply our operators to the confidential computation of outsourced neural networks, thus demonstrating the possibility of evaluating neural networks with relatively low latency, even in the case of recurrent neural networks.Finally, we apply our operators to a technique known as transciphering, making it possible to overcome memory limitation on the client side coming with the large size of FHE ciphertexts
Kumbhare, Deepak. "3D FUNCTIONAL MODELING OF DBS EFFICACY AND DEVELOPMENT OF ANALYTICAL TOOLS TO EXPLORE FUNCTIONAL STN". VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/2531.
Texto completoKleyn, Judith. "The performance of the preliminary test estimator under different loss functions". Thesis, University of Pretoria, 2014. http://hdl.handle.net/2263/43132.
Texto completoThesis (PhD)--University of Pretoria, 2014.
lk2014
Statistics
PhD
Unrestricted
Cardozo, Sandra Vergara. "Função da probabilidade da seleção do recurso (RSPF) na seleção de habitat usando modelos de escolha discreta". Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/11/11134/tde-11032009-143806/.
Texto completoIn ecology, the behavior of animals is often studied to better understand their preferences for different types of habitat and food. The present work is concerned with this topic. It is divided into three chapters. The first concerns the estimation of a resource selection probability function (RSPF) compared with a discrete choice model (DCM) using chi-squared to obtain estimates. The best estimates were obtained by the DCM method. Nevertheless, animals were not selected based on choice alone. With RSPF, the maximum likelihood estimates used with the logistic regression still did not reach the objectives, since the animals have more than one choice. R and Minitab software and the FORTRAN programming language were used for the computations in this chapter. The second chapter discusses further the likelihood presented in the first chapter. A new likelihood for a RSPF is presented, which takes into account the units used and not used, and parametric and non-parametric bootstrapping are employed to study the bias and variance of parameter estimators, using a FORTRAN program for the calculations. In the third chapter, the new likelihood presented in chapter 2, with a discrete choice model is used to resolve a part of the problem presented in the first chapter. A nested structure is proposed for modelling selection by 28 spotted owls (Strix occidentalis) as well as a generalized nested logit model using random utility maximization and a random RSPF. Numerical optimization methods and the SAS system were employed to estimate the nested structural parameters.
Wu, Mengjiao. "Equivalence testing for identity authentication using pulse waves from photoplethysmograph". Diss., 2019. http://hdl.handle.net/2097/39461.
Texto completoDepartment of Statistics
Suzanne Dubnicka
Christopher Vahl
Photoplethysmograph sensors use a light-based technology to sense the rate of blood flow as controlled by the heart’s pumping action. This allows for a graphical display of a patient’s pulse wave form and the description of its key features. A person’s pulse wave has been proposed as a tool in a wide variety of applications. For example, it could be used to diagnose the cause of coldness felt in the extremities or to measure stress levels while performing certain tasks. It could also be applied to quantify the risk of heart disease in the general population. In the present work, we explore its use for identity authentication. First, we visualize the pulse waves from individual patients using functional boxplots which assess the overall behavior and identify unusual observations. Functional boxplots are also shown to be helpful in preprocessing the data by shifting individual pulse waves to a proper starting point. We then employ functional analysis of variance (FANOVA) and permutation tests to demonstrate that the identities of a group of subjects could be differentiated and compared by their pulse wave forms. One of the primary tasks of the project is to confirm the identity of a person, i.e., we must decide if a given person is whom they claim to be. We used an equivalence test to determine whether the pulse wave of the person under verification and the actual person were close enough to be considered equivalent. A nonparametric bootstrap functional equivalence test was applied to evaluate equivalence by constructing point-wise confidence intervals for the metric of identity assurance. We also proposed new testing procedures, including the way of building the equivalence hypothesis and test statistics, determination of evaluation range and equivalence bands, to authenticate the identity.
Chen, Li-Jie y 陳立杰. "A Bootstrapping Approach to Cluster Analysis for Gene Expression Data with Incorporation of Gene Functional Similarity". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/72309351459073201386.
Texto completo國立臺南大學
資訊工程學系碩士班
103
This thesis addressed the problem of incorporating gene semantic similarity into cluster analysis of gene expression data. The purpose was to effectively enhance the biological relevance of the clustering results by simultaneously considering the two features transformed from the gene expression data and gene functional annotations. The key issue of this problem was then on the determination of appropriate feature weights. The method proposed by past related studies needed to manually adjust the feature weights to select the best results. This thesis proposed an automatic feature-weights-determination clustering algorithm that integrated bootstrap and K-medoids methods for clustering gene expression data. The proposed method was validated by applying the method to two sets of frequently used real-life experimental gene expression data of budding yeast Saccharomyces cerevisiae obtained from past related studies. The results were analyzed and compared with the method proposed by past related studies using three well-known external criteria for clustering evaluation. The results indicated that the proposed algorithm can produce comparable or more valid gene expression clustering results than the method proposed by past related studies.
Jabbari, Arfaee Shahab. "Bootstrap Learning of Heuristic Functions". Master's thesis, 2010. http://hdl.handle.net/10048/1589.
Texto completoRoach, Lisa Aretha Nyala. "Temporal Variations in the Compliance of Gas Hydrate Formations". Thesis, 2012. http://hdl.handle.net/1807/44081.
Texto completoLibros sobre el tema "Functional bootstrapping"
McMurry, Timothy y Dimitris Politis. Resampling methods for functional data. Editado por Frédéric Ferraty y Yves Romain. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780199568444.013.7.
Texto completoCheng, Russell. Bootstrap Analysis. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198505044.003.0004.
Texto completoCapítulos de libros sobre el tema "Functional bootstrapping"
Okada, Hiroki, Shinsaku Kiyomoto y Carlos Cid. "Integerwise Functional Bootstrapping on TFHE". En Lecture Notes in Computer Science, 107–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8_7.
Texto completoLi, Zhihao, Benqiang Wei, Ruida Wang, Xianhui Lu y Kunpeng Wang. "Full Domain Functional Bootstrapping with Least Significant Bit Encoding". En Information Security and Cryptology, 203–23. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0942-7_11.
Texto completoBendoukha, Adda-Akram, Pierre-Emmanuel Clet, Aymen Boudguiga y Renaud Sirdey. "Optimized Stream-Cipher-Based Transciphering by Means of Functional-Bootstrapping". En Data and Applications Security and Privacy XXXVII, 91–109. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37586-6_6.
Texto completoClet, Pierre-Emmanuel, Aymen Boudguiga, Renaud Sirdey y Martin Zuber. "ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain". En Progress in Cryptology - AFRICACRYPT 2023, 317–43. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37679-5_14.
Texto completoLiu, Zeyu y Yunhao Wang. "Amortized Functional Bootstrapping in Less than 7 ms, with $$\tilde{O}(1)$$ Polynomial Multiplications". En Advances in Cryptology – ASIACRYPT 2023, 101–32. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8736-8_4.
Texto completoCsörgő, Miklós, Sándor Csörgő y Lajos Horváth. "Bootstrapping Empirical Functions". En An Asymptotic Theory for Empirical Reliability and Concentration Processes, 150–64. New York, NY: Springer New York, 1986. http://dx.doi.org/10.1007/978-1-4615-6420-1_17.
Texto completoApplebaum, Benny. "Bootstrapping Obfuscators via Fast Pseudorandom Functions". En Lecture Notes in Computer Science, 162–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45608-8_9.
Texto completoRomero, Alejandro, Francisco Bellas, Jose A. Becerra y Richard J. Duro. "Bootstrapping Autonomous Skill Learning in the MDB Cognitive Architecture". En Understanding the Brain Function and Emotions, 120–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19591-5_13.
Texto completoYang, Kaifeng y Michael Affenzeller. "Surrogate-assisted Multi-objective Optimization via Genetic Programming Based Symbolic Regression". En Lecture Notes in Computer Science, 176–90. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27250-9_13.
Texto completoGeelen, Robin, Ilia Iliashenko, Jiayi Kang y Frederik Vercauteren. "On Polynomial Functions Modulo $$p^e$$ and Faster Bootstrapping for Homomorphic Encryption". En Advances in Cryptology – EUROCRYPT 2023, 257–86. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30620-4_9.
Texto completoActas de conferencias sobre el tema "Functional bootstrapping"
"Bootstrapping functional data: a study of distributional property of sample eigenvalues". En 19th International Congress on Modelling and Simulation. Modelling and Simulation Society of Australia and New Zealand (MSSANZ), Inc., 2011. http://dx.doi.org/10.36334/modsim.2011.aa.shang.
Texto completoWeiss, Benjamin M., Joshua M. Hamel, Mark A. Ganter y Duane W. Storti. "Data-Driven Additive Manufacturing Constraints for Topology Optimization". En ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85391.
Texto completoPage, Alvaro, Noelia López, William Ricardo Venegas y Pilar Serra. "Comparación de la normalización lineal de la escala de tiempos con el registro funcional continuo en movimientos cíclicos del cuello". En 11 Simposio CEA de Bioingeniería. València: Editorial Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/ceabioing.2019.10027.
Texto completoVahdat, Kimia y Sara Shashaani. "Non-Parametric Uncertainty Bias and Variance Estimation via Nested Bootstrapping and Influence Functions". En 2021 Winter Simulation Conference (WSC). IEEE, 2021. http://dx.doi.org/10.1109/wsc52266.2021.9715420.
Texto completoLuo, Zhenjun y Jian S. Dai. "Patterned Bootstrap: A New Method Which Gives Efficiency for Precision Position Synthesis of Planar Linkages". En ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84658.
Texto completoWei, Hua, Deheng Ye, Zhao Liu, Hao Wu, Bo Yuan, Qiang Fu, Wei Yang y Zhenhui Li. "Boosting Offline Reinforcement Learning with Residual Generative Modeling". En Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/492.
Texto completoLacaze, Sylvain y Samy Missoum. "A Generalized “Max-Min” Sample for Reliability Assessment With Dependent Variables". En ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-34051.
Texto completoVoeikova, Maria D. "MORPHONOLOGICAL PROPERTIES OF NOUNS WITH -KA ELEMENT IN THE FINAL PART". En 49th International Philological Conference in Memory of Professor Ludmila Verbitskaya (1936–2019). St. Petersburg State University, 2022. http://dx.doi.org/10.21638/11701/9785288062353.13.
Texto completoZeng, Zizhen, Shanpu Shen, Bo Wang, Johan J. Estrada-Lopez, Ross Murch y Edgar Sanchez-Sinencio. "An Ultra-low-power Power Management Circuit with Output Bootstrapping and Reverse Leakage Reduction Function for RF Energy Harvesting". En 2020 IEEE/MTT-S International Microwave Symposium (IMS). IEEE, 2020. http://dx.doi.org/10.1109/ims30576.2020.9224098.
Texto completoZheng, Zheng, Hui Li y Mengqi Wang. "Application of a 3D Discrete Ordinates-Monte Carlo Coupling Method on CAP1400 Cavity Streaming Calculation". En 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66401.
Texto completo