We gratefully acknowledge support from
the Simons Foundation and member institutions.

Applications

Authors and titles for stat.AP in Mar 2016, skipping first 70

[ total of 85 entries: 1-10 | ... | 41-50 | 51-60 | 61-70 | 71-80 | 81-85 ]
[ showing 10 entries per page: fewer | more | all ]
[71]  arXiv:1603.05583 (cross-list from cs.OH) [pdf, ps, other]
Title: Analyzing In-Game Movements of Soccer Players at Scale
Comments: MIT Sloan Sports Analytics Conference 2016
Subjects: Other Computer Science (cs.OH); Applications (stat.AP)
[72]  arXiv:1603.05875 (cross-list from cs.CV) [pdf, other]
Title: Approximated Robust Principal Component Analysis for Improved General Scene Background Subtraction
Comments: arXiv admin note: text overlap with arXiv:1511.01245 by other authors
Subjects: Computer Vision and Pattern Recognition (cs.CV); Applications (stat.AP)
[73]  arXiv:1603.05914 (cross-list from q-fin.RM) [pdf, other]
Title: Statistically validated network of portfolio overlaps and systemic risk
Journal-ref: Scientific Reports 6, 39467 (2016)
Subjects: Risk Management (q-fin.RM); Physics and Society (physics.soc-ph); Applications (stat.AP)
[74]  arXiv:1603.06230 (cross-list from q-bio.QM) [pdf, other]
Title: Bayesian methods for event analysis of intracellular currents
Subjects: Quantitative Methods (q-bio.QM); Neurons and Cognition (q-bio.NC); Applications (stat.AP)
[75]  arXiv:1603.06790 (cross-list from q-bio.NC) [pdf, other]
Title: Characterising brain network topologies: a dynamic analysis approach using heat kernels
Subjects: Neurons and Cognition (q-bio.NC); Applications (stat.AP)
[76]  arXiv:1603.07211 (cross-list from q-bio.NC) [pdf, other]
Title: Differentially Expressed Functional Connectivity Networks with K-partite Graph Topology
Subjects: Neurons and Cognition (q-bio.NC); Applications (stat.AP)
[77]  arXiv:1603.07432 (cross-list from cs.CR) [pdf, other]
Title: Predicting Cyber Attack Rates with Extreme Values
Journal-ref: IEEE Transactions on Information Forensics & Security, 10(8): 1666-1677 (2015)
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[78]  arXiv:1603.07433 (cross-list from cs.CR) [pdf, other]
Title: Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
Journal-ref: IEEE Transactions on Information Forensics & Security (IEEE TIFS), 8(11): 1775-1789, (2013)
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[79]  arXiv:1603.07438 (cross-list from cs.CR) [pdf, other]
Title: A Characterization of Cybersecurity Posture from Network Telescope Data
Journal-ref: Proceedings of the 6th International Conference Trusted Systems (INTRUST'2014), pp 105-126
Subjects: Cryptography and Security (cs.CR); Applications (stat.AP)
[80]  arXiv:1603.07439 (cross-list from cs.CR) [pdf, ps, other]
Title: Spatiotemporal patterns and predictability of cyberattacks
Journal-ref: PLoS One 10(5): e0124472 (2015)
Subjects: Cryptography and Security (cs.CR); Data Analysis, Statistics and Probability (physics.data-an); Physics and Society (physics.soc-ph); Applications (stat.AP)
[ total of 85 entries: 1-10 | ... | 41-50 | 51-60 | 61-70 | 71-80 | 81-85 ]
[ showing 10 entries per page: fewer | more | all ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, stat, 2405, contact, help  (Access key information)