Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ministic.<ref>Beck & Melchers, p. 2202.</ref> In this case, one defines a probabilistic failure barrier surface, <math> \mathbf R (t)</math>, over the [[vector spa ...of the [[NASA]]-designed [[NESSUS Probabilistic Analysis Software|NESSUS]] software.<ref>Shah ''et al.'', p. 5.</ref> It was initially used to analyse risks a ...
    4 KB (559 words) - 06:16, 15 March 2023
  • {{Short description|Probabilistic logic programming language}} {{Infobox software ...
    10 KB (1,327 words) - 09:11, 28 June 2024
  • {{Short description|Probabilistic programming language for Bayesian inference}} {{Infobox software ...
    10 KB (1,229 words) - 00:14, 16 January 2025
  • ...algorithm has been implemented in the [[Mallet (software project)|MALLET]] software package published by McCallum's group at the [[University of Massachusetts * [[Probabilistic latent semantic indexing]] (PLSI), an early topic model from Thomas Hofmann ...
    5 KB (699 words) - 23:11, 31 December 2024
  • ...ly outputting the most likely class that the observation should belong to. Probabilistic classifiers provide classification that can be useful in its own right<ref> Probabilistic classifiers generalize this notion of classifiers: instead of functions, th ...
    11 KB (1,470 words) - 19:54, 17 January 2024
  • {{Infobox software | genre = [[Simulation software]] ...
    8 KB (1,064 words) - 22:33, 19 June 2024
  • {{Infobox software ...learning | statistical relational learning (SRL)]] framework for modeling probabilistic and relational domains. ...
    16 KB (2,418 words) - 16:24, 31 July 2021
  • ...em has been proposed that involves finding one or more secret keys using a probabilistic oracle. ...alization of Bernstein--Vazirani algorithm with multiple secret keys and a probabilistic oracle ...
    7 KB (1,097 words) - 20:26, 20 February 2025
  • ...ile fitting techniques or further treatment of peak overlap. [[Probability|Probabilistic]] approaches may also be used to treat peak overlap. ...was limited. Le Bail is also easily integrated into [[Rietveld analysis]] software, and is a part of a number of programs. Both methods improve subsequent str ...
    6 KB (915 words) - 14:17, 21 January 2024
  • | title = Probabilistic integration: A role in statistical computation? (with discussion and rejoin | title = Probabilistic Numerics ...
    19 KB (2,640 words) - 05:04, 27 December 2024
  • A '''staged tree''' is a probabilistic model for a process consisting of a sequence of discrete valued events desc ...and relate this to a class of probability distributions to create a formal probabilistic model. When there is sufficient data, staged trees can instead be used as a ...
    14 KB (2,185 words) - 07:05, 30 January 2025
  • === Probabilistic graphical model representation === == Software == ...
    11 KB (1,790 words) - 22:12, 6 February 2025
  • ...primitive]] which would allow a [[computer program]] to be [[obfuscation (software)|obfuscated]] in a way such that it was impossible to determine anything ab ...{Cite web|date=2014-02-21|title=Cryptographic obfuscation and 'unhackable' software|url=https://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfus ...
    7 KB (1,015 words) - 15:58, 14 October 2024
  • ...classes of systems that can be composed with Reo include [[Component-based software engineering|component-based]] systems, [[Service-oriented architecture|serv == Software engineering properties == ...
    12 KB (1,753 words) - 02:21, 27 November 2024
  • ...https://ieeexplore.ieee.org/document/9785808 |journal=IEEE Transactions on Software Engineering |volume=49 |issue=4 |pages=1487–1507 |arxiv=2109.04738 |doi=10. === Probabilistic modelling === ...
    12 KB (1,784 words) - 20:35, 14 January 2025
  • ...ors=Sulston J, Mallett F, Staden R, Durbin R, Horsnell T, Coulson A |title=Software for genome mapping by fingerprinting techniques |journal=Comput Appl Biosci ...ng for shared markers, others are basically mathematical, usually adopting probabilistic and/or statistical approaches. ...
    9 KB (1,414 words) - 16:27, 4 October 2024
  • ...ng secure processors designed in academia and industry include AEGIS and [[Software Guard Extensions|Intel SGX]]. But the memory addresses are still transferre Goldreich and Ostrovsky proposed this term on software protection. ...
    9 KB (1,410 words) - 13:13, 29 July 2024
  • ...elman |first2=Daniel |last2=Lee |first3=Jiqiang |last3=Guo |title=Stan: A Probabilistic Programming Language for Bayesian Inference and Optimization |journal=Journ * [[List of software for Monte Carlo molecular modeling|Software for Monte Carlo molecular modeling]] ...
    13 KB (2,053 words) - 18:06, 10 January 2025
  • ...nted in several [[probabilistic programming language]]s, including [[Stan (software)|Stan]] and [[PyMC]]. ...
    4 KB (501 words) - 15:34, 7 February 2025
  • ...Guidance for Superfund (RAGS) Volume III - Part A: Process for Conducting Probabilistic Risk Assessment |year=2001 |chapter=Appendix D: Advanced Modeling Approache ...ubjective uncertainty]] (or lack of knowledge) in the input quantity. The software tools then use methods such as [[Monte Carlo analysis]] to propagate the un ...
    11 KB (1,676 words) - 13:04, 28 November 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)