Search results for "Variable"

showing 10 items of 1674 documents

Sequentializing Parameterized Programs

2012

We exhibit assertion-preserving (reachability preserving) transformations from parameterized concurrent shared-memory programs, under a k-round scheduling of processes, to sequential programs. The salient feature of the sequential program is that it tracks the local variables of only one thread at any point, and uses only O(k) copies of shared variables (it does not use extra counters, not even one counter to keep track of the number of threads). Sequentialization is achieved using the concept of a linear interface that captures the effect an unbounded block of processes have on the shared state in a k-round schedule. Our transformation utilizes linear interfaces to sequentialize the progra…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceScheduleComputer scienceD.2.4;F.3.1Interface (computing)Parameterized complexitymodel-checking02 engineering and technologyThread (computing)computer.software_genrelcsh:QA75.5-76.95parameterized programsComputer Science - Software Engineeringsoftware verification0202 electrical engineering electronic engineering information engineeringBlock (data storage)Programming languagelcsh:MathematicsD.2.4Local variable020207 software engineeringlcsh:QA1-939Logic in Computer Science (cs.LO)Software Engineering (cs.SE)Transformation (function)model-checking; software verification; parameterized programs020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceState (computer science)F.3.1computerElectronic Proceedings in Theoretical Computer Science
researchProduct

Adding Path-Functional Dependencies to the Guarded Two-Variable Fragment with Counting

2017

The satisfiability and finite satisfiability problems for the two-variable guarded fragment of first-order logic with counting quantifiers, a database, and path-functional dependencies are both ExpTime-complete.

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESintegrity constraintssatisfiabilitycounting quantifierspath-functional dependenciesComputer Science::Logic in Computer Scienceguarded fragmentkey constraintstwo-variable fragmetLogic in Computer Science (cs.LO)
researchProduct

Finite Satisfiability of the Two-Variable Guarded Fragment with Transitive Guards and Related Variants

2018

We consider extensions of the two-variable guarded fragment, GF2, where distinguished binary predicates that occur only in guards are required to be interpreted in a special way (as transitive relations, equivalence relations, pre-orders or partial orders). We prove that the only fragment that retains the finite (exponential) model property is GF2 with equivalence guards without equality. For remaining fragments we show that the size of a minimal finite model is at most doubly exponential. To obtain the result we invent a strategy of building finite models that are formed from a number of multidimensional grids placed over a cylindrical surface. The construction yields a 2NExpTime-upper bou…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceTwo-variable logicGeneral Computer ScienceComputational complexity theoryLogicguarded fragmentBinary number0102 computer and information sciences01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricstransitive relationEquivalence relationfinite satisfiability problem0101 mathematicsEquivalence (formal languages)Integer programmingMathematicsDiscrete mathematicsTransitive relationNEXPTIMEcomputational complexity010102 general mathematicsLogic in Computer Science (cs.LO)Computational Mathematics010201 computation theory & mathematicsequivalence ralationACM Transactions on Computational Logic
researchProduct

Towards Responsible AI for Financial Transactions

2020

Author's accepted manuscript. © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The application of AI in finance is increasingly dependent on the principles of responsible AI. These principles-explainability, fairness, privacy, accountability, transparency and soundness form the basis for trust in future AI systems. In this empirical study, we address the first p…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer scienceComputer Science - Artificial IntelligenceDecision tree02 engineering and technologyMachine learningcomputer.software_genreMachine Learning (cs.LG)Empirical research020204 information systems0202 electrical engineering electronic engineering information engineeringRobustness (economics)Categorical variableVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Soundnessbusiness.industryDocument clusteringTransparency (behavior)ComputingMethodologies_PATTERNRECOGNITIONArtificial Intelligence (cs.AI)Financial transaction020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer
researchProduct

Accounting for Input Noise in Gaussian Process Parameter Retrieval

2020

Gaussian processes (GPs) are a class of Kernel methods that have shown to be very useful in geoscience and remote sensing applications for parameter retrieval, model inversion, and emulation. They are widely used because they are simple, flexible, and provide accurate estimates. GPs are based on a Bayesian statistical framework which provides a posterior probability function for each estimation. Therefore, besides the usual prediction (given in this case by the mean function), GPs come equipped with the possibility to obtain a predictive variance (i.e., error bars, confidence intervals) for each prediction. Unfortunately, the GP formulation usually assumes that there is no noise in the inpu…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer sciencePosterior probability0211 other engineering and technologiesMachine Learning (stat.ML)02 engineering and technologyMachine Learning (cs.LG)symbols.namesakeStatistics - Machine LearningElectrical and Electronic EngineeringGaussian process021101 geological & geomatics engineeringPropagation of uncertaintyNoise measurementbusiness.industryFunction (mathematics)Geotechnical Engineering and Engineering GeologySea surface temperatureNoiseKernel methodsymbolsGlobal Positioning SystemErrors-in-variables modelsbusinessAlgorithmIEEE Geoscience and Remote Sensing Letters
researchProduct

Using the Tsetlin Machine to Learn Human-Interpretable Rules for High-Accuracy Text Categorization With Medical Applications

2019

Medical applications challenge today's text categorization techniques by demanding both high accuracy and ease-of-interpretation. Although deep learning has provided a leap ahead in accuracy, this leap comes at the sacrifice of interpretability. To address this accuracy-interpretability challenge, we here introduce, for the first time, a text categorization approach that leverages the recently introduced Tsetlin Machine. In all brevity, we represent the terms of a text as propositional variables. From these, we capture categories using simple propositional formulae, such as: if "rash" and "reaction" and "penicillin" then Allergy. The Tsetlin Machine learns these formulae from a labelled tex…

FOS: Computer and information sciencesComputer Science - Machine LearningGeneral Computer ScienceComputer sciencetext categorizationNatural language understandingDecision treeMachine Learning (stat.ML)02 engineering and technologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Annen informasjonsteknologi: 559Machine learningcomputer.software_genresupervised learningMachine Learning (cs.LG)Naive Bayes classifierText miningStatistics - Machine Learning0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceTsetlin machinehealth informaticsInterpretabilityPropositional variableClassification algorithmsArtificial neural networkbusiness.industryDeep learning020208 electrical & electronic engineeringGeneral EngineeringRandom forestSupport vector machinemachine learningCategorization020201 artificial intelligence & image processingArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringbusinessPrecision and recallcomputerlcsh:TK1-9971
researchProduct

Kernel methods and their derivatives: Concept and perspectives for the earth system sciences.

2020

Kernel methods are powerful machine learning techniques which implement generic non-linear functions to solve complex tasks in a simple way. They Have a solid mathematical background and exhibit excellent performance in practice. However, kernel machines are still considered black-box models as the feature mapping is not directly accessible and difficult to interpret.The aim of this work is to show that it is indeed possible to interpret the functions learned by various kernel methods is intuitive despite their complexity. Specifically, we show that derivatives of these functions have a simple mathematical formulation, are easy to compute, and can be applied to many different problems. We n…

FOS: Computer and information sciencesComputer Science - Machine LearningSupport Vector MachineTheoretical computer scienceComputer scienceEntropyKernel FunctionsNormal Distribution0211 other engineering and technologies02 engineering and technologyMachine Learning (cs.LG)Machine LearningStatistics - Machine LearningSimple (abstract algebra)0202 electrical engineering electronic engineering information engineeringOperator TheoryData ManagementMultidisciplinaryGeographyApplied MathematicsSimulation and ModelingQRDensity estimationKernel methodKernel (statistics)Physical SciencessymbolsMedicine020201 artificial intelligence & image processingAlgorithmsResearch ArticleComputer and Information SciencesScienceMachine Learning (stat.ML)Research and Analysis MethodsKernel MethodsKernel (linear algebra)symbols.namesakeArtificial IntelligenceSupport Vector MachinesHumansEntropy (information theory)Computer SimulationGaussian process021101 geological & geomatics engineeringData VisualizationCorrectionRandom VariablesFunction (mathematics)Probability TheorySupport vector machineAlgebraPhysical GeographyLinear AlgebraEarth SciencesEigenvectorsRandom variableMathematicsEarth SystemsPLoS ONE
researchProduct

RationalizeRoots: Software Package for the Rationalization of Square Roots

2019

The computation of Feynman integrals often involves square roots. One way to obtain a solution in terms of multiple polylogarithms is to rationalize these square roots by a suitable variable change. We present a program that can be used to find such transformations. After an introduction to the theoretical background, we explain in detail how to use the program in practice.

FOS: Computer and information sciencesComputer Science - Symbolic ComputationHigh Energy Physics - TheoryHigh energy particleFeynman integralComputationGeneral Physics and AstronomyFOS: Physical sciencesengineering.materialSymbolic Computation (cs.SC)Rationalization (economics)01 natural sciences010305 fluids & plasmasHigh Energy Physics - Phenomenology (hep-ph)Square root0103 physical sciencesComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONAlgebraic number010306 general physicsMathematical PhysicsVariable (mathematics)MapleMathematical Physics (math-ph)AlgebraHigh Energy Physics - PhenomenologyHigh Energy Physics - Theory (hep-th)Hardware and ArchitectureengineeringComputer Science - Mathematical SoftwareMathematical Software (cs.MS)
researchProduct

Right-jumps and pattern avoiding permutations

2015

We study the iteration of the process "a particle jumps to the right" in permutations. We prove that the set of permutations obtained in this model after a given number of iterations from the identity is a class of pattern avoiding permutations. We characterize the elements of the basis of this class and we enumerate these "forbidden minimal patterns" by giving their bivariate exponential generating function: we achieve this via a catalytic variable, the number of left-to-right maxima. We show that this generating function is a D-finite function satisfying a nice differential equation of order~2. We give some congruence properties for the coefficients of this generating function, and we sho…

FOS: Computer and information sciencesD-finite function[ MATH.MATH-CV ] Mathematics [math]/Complex Variables [math.CV]Discrete Mathematics (cs.DM)General Computer Scienceinsertion sort[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM][ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]left-to-right maximumPermutation patternTheoretical Computer Science[ MATH.MATH-NT ] Mathematics [math]/Number Theory [math.NT]Combinatorics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: Mathematicsanalytic combinatoricsMathematics - CombinatoricsDiscrete Mathematics and CombinatoricsGolden ratioMathematicsProbability (math.PR)Generating function[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM][MATH.MATH-CV]Mathematics [math]/Complex Variables [math.CV]Function (mathematics)[MATH.MATH-NT]Mathematics [math]/Number Theory [math.NT]Exponential function[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]generating functionPermutation patternExponentAnalytic combinatoricssupercongruenceCombinatorics (math.CO)Maxima[ MATH.MATH-PR ] Mathematics [math]/Probability [math.PR]Mathematics - ProbabilityComputer Science - Discrete Mathematics
researchProduct

Bayesian classification for dating archaeological sites via projectile points

2021

Dating is a key element for archaeologists. We propose a Bayesian approach to provide chronology to sites that have neither radiocarbon dating nor clear stratigraphy and whose only information comes from lithic arrowheads. This classifier is based on the Dirichlet-multinomial inferential process and posterior predictive distributions. The procedure is applied to predict the period of a set of undated sites located in the east of the Iberian Peninsula during the IVth and IIIrd millennium cal. BC.

FOS: Computer and information sciencesEstadística matemàticachronological modelradiocarbon dating:62 Statistics::62H Multivariate analysis [Classificació AMS]Matemàtica -- HistòriaStatistics - ApplicationsMatemàtica -- Història ; Matemàtics--Biografia:01 History and biography::01A History of mathematics and mathematicians [Classificació AMS]posterior predictive distribution:Matemàtiques i estadística::Estadística matemàtica [Àrees temàtiques de la UPC]Dirichlet-multinomial processBifacial flint arrowheads:62 Statistics::62F Parametric inference [Classificació AMS]Anàlisi multivariableApplications (stat.AP)Matemàtics--Biografia
researchProduct