Search results for "Partial"

showing 10 items of 1477 documents

Expanding the Active Inference Landscape: More Intrinsic Motivations in the Perception-Action Loop

2018

Active inference is an ambitious theory that treats perception, inference and action selection of autonomous agents under the heading of a single principle. It suggests biologically plausible explanations for many cognitive phenomena, including consciousness. In active inference, action selection is driven by an objective function that evaluates possible future actions with respect to current, inferred beliefs about the world. Active inference at its core is independent from extrinsic rewards, resulting in a high level of robustness across e.g.\ different environments or agent morphologies. In the literature, paradigms that share this independence have been summarised under the notion of in…

FOS: Computer and information sciencesComputer scienceComputer Science - Artificial Intelligencepredictive informationBiomedical EngineeringInferenceSystems and Control (eess.SY)02 engineering and technologyAction selectionI.2.0; I.2.6; I.5.0; I.5.1lcsh:RC321-57103 medical and health sciences0302 clinical medicineactive inferenceArtificial IntelligenceFOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringFormal concept analysisMethodsperception-action loopuniversal reinforcement learningintrinsic motivationlcsh:Neurosciences. Biological psychiatry. NeuropsychiatryFree energy principleCognitive scienceRobotics and AII.5.0I.5.1I.2.6Partially observable Markov decision processI.2.0Artificial Intelligence (cs.AI)Action (philosophy)empowermentIndependence (mathematical logic)free energy principleComputer Science - Systems and Control020201 artificial intelligence & image processingBiological plausibility62F15 91B06030217 neurology & neurosurgeryvariational inference
researchProduct

Monoids and Maximal Codes

2011

In recent years codes that are not Uniquely Decipherable (UD) are been studied partitioning them in classes that localize the ambiguities of the code. A natural question is how we can extend the notion of maximality to codes that are not UD. In this paper we give an answer to this question. To do this we introduce a partial order in the set of submonoids of a monoid showing the existence, in this poset, of maximal elements that we call full monoids. Then a set of generators of a full monoid is, by definition, a maximal code. We show how this definition extends, in a natural way, the existing definition concerning UD codes and we find a characteristic property of a monoid generated by a maxi…

FOS: Computer and information sciencesDiscrete mathematicsMonoidCode (set theory)Formal Languages and Automata Theory (cs.FL)lcsh:MathematicsComputer Science - Formal Languages and Automata TheoryAstrophysics::Cosmology and Extragalactic Astrophysicslcsh:QA1-939lcsh:QA75.5-76.95Set (abstract data type)chemistry.chemical_compoundchemistryFOS: MathematicsMathematics - CombinatoricsOrder (group theory)High Energy Physics::ExperimentCombinatorics (math.CO)lcsh:Electronic computers. Computer scienceCharacteristic propertyPartially ordered setMaximal elementMathematicsElectronic Proceedings in Theoretical Computer Science
researchProduct

All Classical Adversary Methods Are Equivalent for Total Functions

2017

We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs( f ). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs( f ) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity canno…

FOS: Computer and information sciencesKolmogorov complexity010102 general mathematicsBlock (permutation group theory)0102 computer and information sciencesFunction (mathematics)Computational Complexity (cs.CC)Adversary01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricsComputer Science - Computational ComplexityComputational Theory and Mathematics010201 computation theory & mathematicsPartial functionSensitivity (control systems)0101 mathematicsEquivalence (measure theory)MathematicsACM Transactions on Computation Theory
researchProduct

The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction

2020

AbstractIn model checking, partial-order reduction (POR) is an effective technique to reduce the size of the state space. Stubborn sets are an established variant of POR and have seen many applications over the past 31 years. One of the early works on stubborn sets shows that a combination of several conditions on the reduction is sufficient to preserve stutter-trace equivalence, making stubborn sets suitable for model checking of linear-time properties. In this paper, we identify a flaw in the reasoning and show with a counter-example that stutter-trace equivalence is not necessarily preserved. We propose a solution together with an updated correctness proof. Furthermore, we analyse in whi…

FOS: Computer and information sciencesModel checkingComputer Science - Logic in Computer ScienceTheoretical computer sciencepartial-order reductionComputer scienceautomaattien teoria020207 software engineering02 engineering and technologymodel checkingArticleLogic in Computer Science (cs.LO)Partial order reductionstubborn sets0202 electrical engineering electronic engineering information engineeringState space020201 artificial intelligence & image processingEquivalence (formal languages)Equivalence (measure theory)tietojenkäsittely
researchProduct

On the family of $r$-regular graphs with Grundy number $r+1$

2014

International audience; The Grundy number of a graph $G$, denoted by $\Gamma(G)$, is the largest $k$ such that there exists a partition of $V(G)$, into $k$ independent sets $V_1,\ldots, V_k$ and every vertex of $V_i$ is adjacent to at least one vertex in $V_j$, for every $j < i$. The objects which are studied in this article are families of $r$-regular graphs such that $\Gamma(G) = r + 1$. Using the notion of independent module, a characterization of this family is given for $r=3$. Moreover, we determine classes of graphs in this family, in particular the class of $r$-regular graphs without induced $C_4$, for $r \le 4$. Furthermore, our propositions imply results on partial Grundy number.

FOS: Computer and information sciencesPartial Grundy numberDiscrete Mathematics (cs.DM)Regular graphFalse twinsFOS: MathematicsGrundy numberMathematics - Combinatorics[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM]Combinatorics (math.CO)[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science - Discrete Mathematics
researchProduct

Bayesian Checking of the Second Levels of Hierarchical Models

2007

Hierarchical models are increasingly used in many applications. Along with this increased use comes a desire to investigate whether the model is compatible with the observed data. Bayesian methods are well suited to eliminate the many (nuisance) parameters in these complicated models; in this paper we investigate Bayesian methods for model checking. Since we contemplate model checking as a preliminary, exploratory analysis, we concentrate on objective Bayesian methods in which careful specification of an informative prior distribution is avoided. Numerous examples are given and different proposals are investigated and critically compared.

FOS: Computer and information sciencesStatistics and ProbabilityModel checkingModel checkingComputer scienceconflictGeneral MathematicsBayesian probabilityMachine learningcomputer.software_genreMethodology (stat.ME)partial posterior predictivePrior probabilityStatistics - Methodologybusiness.industrymodel criticismProbability and statisticsExploratory analysisobjective Bayesian methodsempirical-Bayesposterior predictivep-valuesArtificial intelligenceStatistics Probability and Uncertaintybusinesscomputer
researchProduct

Dirac equation as a quantum walk over the honeycomb and triangular lattices

2018

A discrete-time Quantum Walk (QW) is essentially an operator driving the evolution of a single particle on the lattice, through local unitaries. Some QWs admit a continuum limit, leading to well-known physics partial differential equations, such as the Dirac equation. We show that these simulation results need not rely on the grid: the Dirac equation in $(2+1)$--dimensions can also be simulated, through local unitaries, on the honeycomb or the triangular lattice. The former is of interest in the study of graphene-like materials. The latter, we argue, opens the door for a generalization of the Dirac equation to arbitrary discrete surfaces.

FOS: Computer and information sciences[ INFO ] Computer Science [cs]Differential equationFOS: Physical sciencestriangulation01 natural sciences010305 fluids & plasmassymbols.namesakeHigh Energy Physics - Lattice[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]Lattice (order)Mesoscale and Nanoscale Physics (cond-mat.mes-hall)0103 physical sciences[ PHYS.PHYS.PHYS-GEN-PH ] Physics [physics]/Physics [physics]/General Physics [physics.gen-ph]unitaritysurface[INFO]Computer Science [cs]Quantum walkHexagonal latticeDirac equationcontinuum limit010306 general physicsQuantumComputingMilieux_MISCELLANEOUSlatticeMathematical physicsPhysicsQuantum PhysicsPartial differential equationCondensed Matter - Mesoscale and Nanoscale PhysicsUnitarity[PHYS.HLAT]Physics [physics]/High Energy Physics - Lattice [hep-lat]High Energy Physics - Lattice (hep-lat)[ PHYS.HLAT ] Physics [physics]/High Energy Physics - Lattice [hep-lat]differential equations[PHYS.PHYS.PHYS-GEN-PH]Physics [physics]/Physics [physics]/General Physics [physics.gen-ph]Computer Science - Distributed Parallel and Cluster ComputingDirac equationsymbolsDistributed Parallel and Cluster Computing (cs.DC)Quantum Physics (quant-ph)Physical Review A
researchProduct

Simple algorithms for calculation of the axial‐symmetric heat transport problem in a cylinder

2001

The approximation of axial‐symmetric heat transport problem in a cylinder is based on the finite volume method. In the classical formulation of the finite volume method it is assumed that the flux terms in the control volume are approximated with the finite difference expressions. Then in the 1‐D case the corresponding finite difference scheme for the given source function is not exact. There we propose the exact difference scheme. In 2‐D case the corresponding integrals are approximated using different quadrature formulae. This procedure allows one to reduce the heat transport problem described by a partial differential equation to an initial‐value problem for a system of two ordinary diff…

FTCS schemeFinite volume methodDifferential equationMathematical analysisFinite difference method-Parabolic partial differential equationFinite element methodModeling and SimulationQA1-939CylinderAnalysisSIMPLE algorithmMathematicsMathematicsMathematical Modelling and Analysis
researchProduct

A fully adaptive wavelet algorithm for parabolic partial differential equations

2001

We present a fully adaptive numerical scheme for the resolution of parabolic equations. It is based on wavelet approximations of functions and operators. Following the numerical analysis in the case of linear equations, we derive a numerical algorithm essentially based on convolution operators that can be efficiently implemented as soon as a natural condition on the space of approximation is satisfied. The algorithm is extended to semi-linear equations with time dependent (adapted) spaces of approximation. Numerical experiments deal with the heat equation as well as the Burgers equation.

FTCS schemeNumerical AnalysisDifferential equationIndependent equationApplied MathematicsMathematical analysisMathematicsofComputing_NUMERICALANALYSISExponential integratorParabolic partial differential equationComputational MathematicsMultigrid methodAlgorithmMathematicsNumerical stabilityNumerical partial differential equationsApplied Numerical Mathematics
researchProduct

A Survey on Proxy Mobile IPv6 Handover

2016

[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…

Fast localized Proxy Mobile IPv6 (PMIPv6) handover (HO) procedureEngineeringMobility modelComputer Networks and CommunicationsReactive mode0211 other engineering and technologiesMobile computing02 engineering and technologyPMIPv6 with partial bicastingPMIPv60202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringProxy Mobile IPv6Mobility management021103 operations researchbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPredictive modeHO in PMIPv6020206 networking & telecommunicationsINGENIERIA TELEMATICAComputer Science ApplicationsHandoverControl and Systems EngineeringMobile IPRoamingbusinessTelecommunicationsInformation SystemsComputer networkIEEE Systems Journal
researchProduct