منابع مشابه
Man vs. Machine: Quantitative and Discretionary Equity Management∗
I use a machine learning technique to classify the universe of active US equity mutual funds as quantitative , who mostly rely of computer-driven models and xed rules, or discretionary , who mostly rely on human judgement. I rst document several new facts about quantitative investing. I then propose an equilibrium model in which quantitative funds have a greater information processing capacity ...
متن کاملMan vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived from fixed datasets, and must be periodically retrained. In adversarial environments, attackers can adapt by modifying their behavior or even sabotaging ML models by polluting...
متن کاملFully Automated Enhanced Tumor Compartmentalization: Man vs. Machine Reloaded
OBJECTIVE Comparison of a fully-automated segmentation method that uses compartmental volume information to a semi-automatic user-guided and FDA-approved segmentation technique. METHODS Nineteen patients with a recently diagnosed and histologically confirmed glioblastoma (GBM) were included and MR images were acquired with a 1.5 T MR scanner. Manual segmentation for volumetric analyses was pe...
متن کاملIdentification of intermittent control in man and machine.
Regulation by negative feedback is fundamental to engineering and biological processes. Biological regulation is usually explained using continuous feedback models from both classical and modern control theory. An alternative control paradigm, intermittent control, has also been suggested as a model for biological control systems, particularly those involving the central nervous system. However...
متن کاملHuman vs. machine speaker identification with telephone speech
An experiment compared the speaker recognition performance of human listeners to that of computer algorithms/systems. Listening protocols were developed analogous to procedures used in the algorithm evaluation run by the U.S. National Institute of Standards and Technology (NIST), and the same telephone conversation data were used. For “same number” testing, with three-second samples, listener p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Multimedia Tools and Applications
سال: 2015
ISSN: 1380-7501,1573-7721
DOI: 10.1007/s11042-015-2607-4