Search results for "Software"

showing 10 items of 7396 documents

LeSSS: Learned Shared Semantic Spaces for Relating Multi-Modal Representations of 3D Shapes

2015

In this paper, we propose a new method for structuring multi-modal representations of shapes according to semantic relations. We learn a metric that links semantically similar objects represented in different modalities. First, 3D-shapes are associated with textual labels by learning how textual attributes are related to the observed geometry. Correlations between similar labels are captured by simultaneously embedding labels and shape descriptors into a common latent space in which an inner product corresponds to similarity. The mapping is learned robustly by optimizing a rank-based loss function under a sparseness prior for the spectrum of the matrix of all classifiers. Second, we extend …

Theoretical computer sciencebusiness.industryComputer scienceRank (computer programming)Cognitive neuroscience of visual object recognitioncomputer.software_genreComputer Graphics and Computer-Aided DesignProduct (mathematics)Similarity (psychology)Line (geometry)Metric (mathematics)Collaborative filteringEmbeddingArtificial intelligencebusinesscomputerNatural language processingComputer Graphics Forum
researchProduct

Learning small programs with additional information

1997

This paper was inspired by [FBW 94]. An arbitrary upper bound on the size of some program for the target function suffices for the learning of some program for this function. In [FBW 94] it was discovered that if “learning” is understood as “identification in the limit,” then in some programming languages it is possible to learn a program of size not exceeding the bound, while in some other programming languages this is not possible.

Theoretical computer sciencebusiness.industryComputer sciencemedia_common.quotation_subjectInductive reasoningMachine learningcomputer.software_genreUpper and lower boundsIdentification (information)Recursive functionsArtificial intelligenceLimit (mathematics)businessFunction (engineering)computermedia_common
researchProduct

On the use of neighbourhood-based non-parametric classifiers

1997

Alternative non-parametric classification schemes, which come from the use of different definitions of neighbourhood, are introduced. In particular, the Nearest Centroid Neighbourhood along with the neighbourhood relation derived from the Gabriel Graph and the Relative Neighbourhood Graph are used to define the corresponding (k-)Nearest Neighbour-like classifiers. Experimental results are reported to compare the performance of the approaches proposed here to the one obtained with the k-Nearest Neighbours rule.

Theoretical computer sciencebusiness.industryGabriel graphNonparametric statisticsCentroidPattern recognitionClassification schemeNeighbourhood graphComputingMethodologies_PATTERNRECOGNITIONNeighbourhood components analysisArtificial IntelligenceSignal ProcessingNeighbourhood systemComputingMethodologies_GENERALComputer Vision and Pattern RecognitionArtificial intelligencebusinessNeighbourhood (mathematics)SoftwareMathematics
researchProduct

The power of procrastination in inductive inference: How it depends on used ordinal notations

1995

We consider inductive inference with procrastination. Usually it is defined using constructive ordinals. For constructive ordinals there exist many different systems of notations. In this paper we study how the power of inductive inference depends on used system of notations.

Theoretical computer sciencebusiness.industrymedia_common.quotation_subjectProcrastinationInductive reasoningMachine learningcomputer.software_genreNotationConstructivePower (physics)Mathematics::LogicArtificial intelligencebusinesscomputermedia_commonMathematics
researchProduct

A basic analysis toolkit for biological sequences

2007

This paper presents a software library, nicknamed BATS, for some basic sequence analysis tasks. Namely, local alignments, via approximate string matching, and global alignments, via longest common subsequence and alignments with affine and concave gap cost functions. Moreover, it also supports filtering operations to select strings from a set and establish their statistical significance, via z-score computation. None of the algorithms is new, but although they are generally regarded as fundamental for sequence analysis, they have not been implemented in a single and consistent software package, as we do here. Therefore, our main contribution is to fill this gap between algorithmic theory an…

Theoretical computer sciencelcsh:QH426-470Computer sciencebusiness.industrysoftwareComputationApplied MathematicsString searching algorithmApproximate string matchingSoftware ArticleSet (abstract data type)Longest common subsequence problemlcsh:GeneticsSoftwareComputational Theory and Mathematicslcsh:Biology (General)Structural BiologyAffine transformationPerlbusinesscomputerMolecular Biologylcsh:QH301-705.5computer.programming_language
researchProduct

An ontological-based knowledge organization for bioinformatics workflow management system

2012

Motivation and Objectives In the field of Computer Science, ontologies represent formal structures to define and organize knowledge of a specific application domain (Chandrasekaran et al., 1999). An ontology is composed of entities, called classes, and relationships among them. Classes are characterized by features, called attributes, and they can be arranged into a hierarchical organization. Ontologies are a fundamental instrument in Artificial Intelligence for the development of Knowledge-Based Systems (KBS). With its formal and well defined structure, in fact, an ontology provides a machine-understandable language that allows automatic reasoning for problems resolution. Typical KBS are E…

Theoretical computer scienceworkflow management systembusiness.industryComputer scienceIntelligent decision support systemBioinformatics workflow management systembioinformaticsOntology (information science)Solvercomputer.software_genreExpert systemWorkflowArtificial intelligenceontologybusinessCluster analysiscomputerWorkflow management system
researchProduct

Theognis of Megara and the Divine Creating Power in the Framework of Semiotic Textology: An Application of János Sándor Petöfi’s Theory to Archaic Gr…

2012

This paper is a demonstration of an application of Semiotic Textology to a limited case study. The main aspects of Semiotic Textology, the theory elaborated by Petöfi, are presented; secondly the linguistic aspects of the interpretation of lines 133-134 of the Theognis of Megara's poem, analysed in the framework of said theory, are presented. All the relevant syntactic, semantic, pragmatic information involved in text processing have been considered. Through fixed steps, it is shown that text processing is not exclusively a grammatical activity, because within a theoretical interpretation an Interpreter needs a number of contextual hypotheses, in order to understand the author's ontology. ©…

Theoretical interpretationLinguistics and LanguagePoetryInterpretation (philosophy)PhilosophyText processingTheognis of Megaracomputer.software_genreSemanticsSemiotic TextologyLinguisticsSettore L-LIN/01 - Glottologia E LinguisticaEpistemologyJános Sándor PetöfiPhilosophyText processingComputer Science (miscellaneous)OntologySemioticsGreek literaturecomputerInterpreterJournal of Logic, Language and Information
researchProduct

New QM/MM implementation of the DFTB3 method in the gromacs package.

2015

The approximate density-functional tight-binding theory method DFTB3 has been implemented in the quantum mechanics/molecular mechanics (QM/MM) framework of the Gromacs molecular simulation package. We show that the efficient smooth particle–mesh Ewald implementation of Gromacs extends to the calculation of QM/MM electrostatic interactions. Further, we make use of the various free-energy functionalities provided by Gromacs and the PLUMED plugin. We exploit the versatility and performance of the current framework in three typical applications of QM/MM methods to solve biophysical problems: (i) ultrafast proton transfer in malonaldehyde, (ii) conformation of the alanine dipeptide, and (iii) el…

Theory methodComputer scienceMolecular simulationGeneral ChemistryExtended samplingFree energy simulationMolecular dynamicsDensity-functional tight-bindingComputational scienceQM/MMComputational MathematicsMolecular dynamicsQuantum TheoryThermodynamicsComputer Simulationta116Quantum mechanics/molecular mechanicsSoftwareProtein BindingJournal of computational chemistry
researchProduct

The Insight of Empiricism. In Defense of a Hypothetical, but Propositional Given

2009

In this paper, I defend a hypothetical but propositional given as the fundamental insight of empiricism

TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSoftware_GENERALAnàlisi (Filosofia)GeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)
researchProduct

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct