Browse/Search Results: 1-10 of 12

Selected(0)Clear Items/Page:    Sort:
Unsupervised modeling and feature selection of sequential spherical data through nonparametric hidden Markov models Journal article
International Journal of Machine Learning and Cybernetics,2022, volume: 13, issue: 10, pages: 3019-3029
Authors:  Fan, Wentao;  Hou, Wenjuan
Favorite  |  View/Download:4/0  |  Submit date:2022/11/14
Banach contraction principle, q-scale function and ultimate ruin probability under a Markov-modulated classical risk model Journal article
Scandinavian Actuarial Journal,2022, volume: 2022, issue: 3, pages: 234-243
Authors:  Jiang, Zhengjun
Favorite  |  View/Download:12/0  |  Submit date:2021/10/19
Gambler's ruin problem in a Markov-modulated jump-diffusion risk model Journal article
Scandinavian Actuarial Journal,2022, volume: 2022, issue: 8, pages: 682-694
Authors:  Liu, Yuxuan;  Jiang, Zhengjun;  Qu, Yixin
Favorite  |  View/Download:13/0  |  Submit date:2022/05/05
Fish detection based on grey-markov model Conference paper
Proceedings - 2020 2nd International Conference on Applied Machine Learning, ICAML 2020
Authors:  Xu,Bokai;  Li,Xinyue;  Shen,Yiqin
Favorite  |  View/Download:1/0  |  Submit date:2022/02/23
Dynamic Consolidation Based on Kth-Order Markov Model for Virtual Machines Conference paper
EAI/Springer Innovations in Communication and Computing
Authors:  Jiang,Na
Favorite  |  View/Download:2/0  |  Submit date:2025/06/04
SpamTracer: Manual fake review detection for O2O commercial platforms by using geolocation features Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Fuzhou, China, December 14-17, 2018
Authors:  Deng, Ruoyu;  Ruan, Na;  Jin, Ruidong;  Lu, Yu;  Jia, Weijia
Favorite  |  View/Download:5/0  |  Submit date:2021/07/30
Achieving differential privacy of data disclosure from non-intrusive load monitoring in smart grid Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Xi'an, CHINA, OCT 23-25, 2017
Authors:  Cao, Hui;  Liu, Shubo;  Guan, Zhitao;  Wu, Longfei;  Wang, Tian
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
A hybrid secure scheme for wireless sensor networks against timing attacks using continuous-time Markov chain and queueing model Journal article
Sensors (Switzerland),2016, volume: 16, issue: 10
Authors:  Meng,Tianhui;  Li,Xiaofan;  Zhang,Sha;  Zhao,Yubin
Favorite  |  View/Download:3/0  |  Submit date:2025/02/20
Joint longitudinal and survival-cure models in tumour xenograft experiments Journal article
Statistics in Medicine,2014, volume: 33, issue: 18, pages: 3229-3240
Authors:  Pan, Jianxin;  Bao, Yanchun;  Dai, Hongsheng;  Fang, Hongbin
Favorite  |  View/Download:3/0  |  Submit date:2021/08/16
An application of CUSUM chart on financial trading Conference paper
Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, Emeishan, China, 14-15 December 2013
Authors:  Xin, Ling;  Yu, Philip L. H.;  Lam, Kin
Favorite  |  View/Download:3/0  |  Submit date:2022/06/17