نتایج جستجو برای: randomization
تعداد نتایج: 14588 فیلتر نتایج به سال:
Mendelian randomization is an epidemiological approach to making causal inferences using observational data. It makes use of the natural that occurs in generation individual’s genetic makeup a way analogous study design randomized controlled trial and uses instrumental variable analysis where variant(s) are instrument (analogous random allocation treatment group trial). As with any variable, th...
Address space randomization is believed to be a strong defense against memory error exploits. Many code and data objects in a potentially vulnerable program and the system could be randomized, including those on the stack and heap, base address of code, order of functions, PLT, GOT, etc. Randomizing these code and data objects is believed to be effective in obfuscating the addresses in memory t...
Background The potential of Mendelian randomization studies is rapidly expanding due to: (i) the growing power of genome-wide association study (GWAS) meta-analyses to detect genetic variants associated with several exposures; and (ii) the increasing availability of these genetic variants in large-scale surveys. However, without a proper biological understanding of the pleiotropic working of ge...
Rai¤a (1961) has suggested that ambiguity aversion will cause a strict preference for randomization. We show, however, that dynamic consistency implies that individuals will be indi¤erent to ex ante randomizations. On the other hand, it is possible for a dynamically-consistent ambiguity averse preference relation to exhibit a strict preference for some ex post randomizations. We argue that our ...
Mining graph data is an active research area. Several data mining methods and algorithms have been proposed to identify structures from graphs; still, the evaluation of those results is lacking. Within the framework of statistical hypothesis testing, we focus in this paper on randomization techniques for unweighted undirected graphs. Randomization is an important approach to assess the statisti...
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflows, heap overflows, etc. Several techniques have been developed to defend against the exploitation of these vulnerabilities, with the most promising defenses being based on randomization. Two randomization techniques ha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید