Filters








163 Hits in 5.8 sec

Provably Auditing Ordinary Least Squares in Low Dimensions [article]

Ankur Moitra, Dhruv Rohatgi
2022 arXiv   pre-print
Measuring the stability of conclusions derived from Ordinary Least Squares linear regression is critically important, but most metrics either only measure local stability (i.e. against infinitesimal changes  ...  We show that in the low-dimensional regime where the number of covariates is a constant but the number of samples is large, there are efficient algorithms for provably estimating (a fractional version  ...  The popularity of ordinary least squares is attributable to its low computational costs, its intuitive plausibility in a wide variety of circumstances, and its support by a broad and sophisticated body  ... 
arXiv:2205.14284v2 fatcat:kqabcsdzl5gvpbss3rsqepypni

Trust and power as predictors to tax compliance: Global evidence

Abdulsalam Mas'ud, Nor Aziah Abd Manaf, Natrah Saad
2019 Economics & Sociology  
Data was analyzed through Ordinary Least Squares Regression Analysis. The results reveal that trust in authorities significantly influences tax compliance, but power of authorities does not.  ...  However, application of cross-sectional analysis in validating the framework has been scant, the available studies being focused on a single continent only.  ...  Lastly, as this study failed to establish the significant influence of power of authorities and its interaction with trust in authorities in explaining tax compliance, future research should attempt in  ... 
doi:10.14254/2071-789x.2019/12-2/11 fatcat:w4dv72mfurhqvdtc6boovl73ri

Hermite polynomials as provably good functions to watermark white gaussian hosts

Teddy Furon
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content.  ...  The watermark detector checks for the presence of this particular weak signal in content.  ...  Moreover, we wish to maintain a low detector's complexity; hence, no human visual or auditive system can recreate an estimate of θ.  ... 
doi:10.1145/1161366.1161406 dblp:conf/mmsec/Furon06 fatcat:2p4dhqy4tzez7di4r3nha62mua

EKTELO

Dan Zhang, Ryan McKenna, Ios Kotsogiannis, Michael Hay, Ashwin Machanavajjhala, Gerome Miklau
2018 Proceedings of the 2018 International Conference on Management of Data - SIGMOD '18  
Definition 4. 1 ( 1 Ordinary least squares (LS)).  ...  Code reuse Once reformulated in ϵktelo, nearly all algorithms use the Vector Laplace operator and least squares inference.  ...  Therefore, Furthermore, observe that each term in (q, s, σ ,v) ∈ (c) also appears in (sv).  ... 
doi:10.1145/3183713.3196921 dblp:conf/sigmod/ZhangMKHMM18 fatcat:foqie3gtbbcpjici7yxvrvpbpm

Power IoT System Architecture Integrating Trusted Computing and Blockchain

Yong Yan, Jinqian Chen, Ying Yao, Shaoyong Guo, Ao Xiong, Wang Zhang, Chi-Hua Chen
2022 Wireless Communications and Mobile Computing  
It is used to monitor the status of each acquisition devices in time, detect the malicious terminal in time, isolate the suspicious terminal with low credibility from the power Internet of Things, and  ...  A method for malicious node detection based on blockchain (MMNDB) is placed in acquisition layer.  ...  In order to effectively avoid the limitation of single weight, this paper adopts the combined weight optimization model based on the least square method to obtain the optimal weight value.  ... 
doi:10.1155/2022/2891917 fatcat:r6uwb23xszcgffezgjdcloamai

Large-Scale Synthesis of Functional Spiking Neural Circuits

Terrence C. Stewart, Chris Eliasmith
2014 Proceedings of the IEEE  
ABSTRACT | In this paper, we review the theoretical and software tools used to construct Spaun, the first (and so far only) brain model capable of performing cognitive tasks.  ...  performing multiple cognitive functions using a combination of biologically plausible spiking neurons, and an architecture that mimics the organization, function, and representational resources used in  ...  0 A 0 ; 0 B 0 Þ For net ¼ nef:Networkð 0 Elementwise Square 0 Þ net:makeð 0 A 0 ; neurons ¼ 20; dimensions ¼ 1Þ net:makeð 0 B 0 ; neurons ¼ 20; dimensions ¼ 1Þ def squareðxÞ : return x½0 Ã x½0; x½1 Ã  ... 
doi:10.1109/jproc.2014.2306061 fatcat:bclajcxbmzgp5bqeageaek5leu

Synopses for Massive Data: Samples, Histograms, Wavelets, Sketches

Graham Cormode
2011 Foundations and Trends in Databases  
Picking the B largest HWT coefficients results in a synopsis that provides the optimal L 2 (sum-squared) error for the reconstructed data.  ...  a wavelet (i.e., "frequency") domain, and can capture combinations of high and low frequency information.  ...  For each bucket, the line can be fit using a standard least-squares algorithm.  ... 
doi:10.1561/1900000004 fatcat:wk7razxkmzcv7fzczftlohblwa

L-diversity

Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam
2007 ACM Transactions on Knowledge Discovery from Data  
In a k-anonymized dataset, each record is indistinguishable from at least k − 1 other records with respect to certain "identifying" attributes.  ...  In addition to building a formal foundation for ℓ-diversity, we show in an experimental evaluation that ℓ-diversity is practical and can be implemented efficiently.  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.  ... 
doi:10.1145/1217299.1217302 fatcat:fq7cy46zavbcdmnsg2ggrnwaku

L-diversity: privacy beyond k-anonymity

A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam
2006 22nd International Conference on Data Engineering (ICDE'06)  
In a k-anonymized dataset, each record is indistinguishable from at least k − 1 other records with respect to certain "identifying" attributes.  ...  In addition to building a formal foundation for -diversity, we show in an experimental evaluation that -diversity is practical and can be implemented efficiently.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.  ... 
doi:10.1109/icde.2006.1 dblp:conf/icde/MachanavajjhalaGKV06 fatcat:chnbqa6c6raytkpr4ipdmxlrjm

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
Glenn has made extensive contributions to the Solaris security foundation, including Access Control Lists, Auditing, Device Allocation, and OS Virtualization.  ...  As a Fulbright scholar, he earned his M.S. and Ph.D. degrees in Computer Science from Purdue University in 1993 and 1997, performing most of his dissertation research in the Computer Science Laboratory  ...  Lipner chose two secrecy levels, audit manager and system low, where audit manager is more secret (i.e., logs cannot be read once they are written).  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

Secure and Efficient Decentralized Federated Learning with Data Representation Protection [article]

Zhen Qin, Shuiguang Deng, Xueqiang Yan, Schahram Dustdar, Albert Y. Zomaya
2022 arXiv   pre-print
In this paper, we propose BlockDFL, an efficient fully peer-to-peer (P2P) framework for decentralized FL.  ...  Federated learning (FL) is a promising technical support to the vision of ubiquitous artificial intelligence in the sixth generation (6G) wireless communication network.  ...  The communication cost of BlockDFL is low since less than 10% of the elements in local updates are transmitted on average.  ... 
arXiv:2205.10568v1 fatcat:4qvdpfjiavhp7lnr3cykdqubti

An Interval Arithmetic for Robust Error Estimation [article]

Oliver Flatt, Pavel Panchekha
2021 arXiv   pre-print
Error intervals express rich notions of input validity and indicate whether all or some points in an interval violate implicit or explicit preconditions.  ...  For each variable, the result is a set of intervals, where inputs outside the set are provably invalid.  ...  because the square root of 4 is exactly 2. However, sqrt ( [0, 2!]) = [0, 1.414 . . .] has a movable right endpoint because the square root of 2 is not exact at any precision.  ... 
arXiv:2107.05784v1 fatcat:ky2n7rqmhzbidhshupu6r3t5hq

Citation: 53 Duke L

James Coxt, Randall Thomastt
2003 unpublished
We find that one-fourth of all the private class action settlements occurring in suits that yield less than 10 percent of provable losses are settled for less than 2 percent of provable losses, but that  ...  Finally, we create a model for estimating DUKE LA W JO URNA L damages to compare settlement ratios in cases with parallel SEC actions to those in private actions.  ...  in the audit of ). 20.  ... 
fatcat:nm5nrzu4fjb3djzbhz63mspy6i

SEC ENFORCEMENT HEURISTICS: AN EMPIRICAL INQUIRY

James Cox, Randall Thomas
DUKE LAW JOURNAL   unpublished
We find that one-fourth of all the private class action settlements occurring in suits that yield less than 10 percent of provable losses are settled for less than 2 percent of provable losses, but that  ...  Finally, we create a model for estimating damages to compare settlement ratios in cases with parallel SEC actions to those in private actions.  ...  0.073 3.518 0.000 Intercept -1.381 0.205 -6.748 0.000 McFadden R-squared 7.5% 111.  ... 
fatcat:yxia5py5wzhzfmehu77sqkhzpa

Sentencing the Green-Collar Offender: Punishment, Culpability, and Environmental Crime

Michael M. O'Hear
2004 Journal of criminal law & criminology  
Of the eleven factual variables made relevant by the environmental guidelines, at least eight focus squarely on matters of harm, dangerousness, or a combination of the two. 4 2 9 For instance, the sentencing  ...  High downward departure rates, coupled with an emphasis on culpability factors in explaining those departures, suggest that low-culpability defendants (or at least those perceived by judges to be low-culpability  ...  A rules-based system, or at least one in the form of the present Guidelines, suffers its own uncertainties as a result of its complexity.  ... 
doi:10.2307/3491383 fatcat:iw4qosgx55ewzhgjypvch5qdeq
« Previous Showing results 1 — 15 out of 163 results