Search results for "computer.software_genre"

showing 10 items of 3858 documents

Researching Conditional Probability Problem Solving

2014

The chapter is organized into two parts. In the first one, the main protagonist is the conditional probability problem. We show a theoretical study about conditional probability problems, identifying a particular family of problems we call ternary problems of conditional probability. We define the notions of Level, Category and Type of a problem in order to classify them into sub-families and in order to study them better. We also offer a tool we call trinomial graph that functions as a generative model for this family of problems. We show the syntax of the model that allows researchers and teachers to translate a problem in terms of the trinomial graphs language, and the consequences of th…

Theoretical computer scienceSyntax (programming languages)business.industryConditional probabilityTrinomialType (model theory)Machine learningcomputer.software_genreTranslation (geometry)GraphGenerative modelOrder (business)Artificial intelligencebusinesscomputerMathematics
researchProduct

Robustness and Randomness

2008

The study of robustness problems for computational geometry algorithms is a topic that has been subject to intensive research efforts from both computer science and mathematics communities. Robustness problems are caused by the lack of precision in computations involving floating-point instead of real numbers. This paper reviews methods dealing with robustness and inaccuracy problems. It discusses approaches based on exact arithmetic, interval arithmetic and probabilistic methods. The paper investigates the possibility to use randomness at certain levels of reasoning to make geometric constructions more robust.

Theoretical computer sciencebusiness.industryComputation020207 software engineering0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesInterval arithmeticProbabilistic method010201 computation theory & mathematicsRobustness (computer science)0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerRandomnessMathematicsReal number
researchProduct

High Locality Representations for Automated Programming

2011

We study the locality of the genotype-phenotype mapping used in grammatical evolution (GE). GE is a variant of genetic programming that can evolve complete programs in an arbitrary language using a variable-length binary string. In contrast to standard GP, which applies search operators directly to phenotypes, GE uses an additional mapping and applies search operators to binary genotypes. Therefore, there is a large semantic gap between genotypes (binary strings) and phenotypes (programs or expressions). The case study shows that the mapping used in GE has low locality leading to low performance of standard mutation operators. The study at hand is an example of how basic design principles o…

Theoretical computer sciencebusiness.industryComputer scienceLocalityParse treeGenetic programmingcomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEGrammatical evolutionLocal search (optimization)Edit distanceArtificial intelligenceHeuristicsbusinesscomputerNatural language processingSemantic gap
researchProduct

Online Induction of Probabilistic Real Time Automata

2012

Probabilistic real time automata (PRTAs) are a representation of dynamic processes arising in the sciences and industry. Currently, the induction of automata is divided into two steps: the creation of the prefix tree acceptor (PTA) and the merge procedure based on clustering of the states. These two steps can be very time intensive when a PRTA is to be induced for massive or even unbounded data sets. The latter one can be efficiently processed, as there exist scalable online clustering algorithms. However, the creation of the PTA still can be very time consuming. To overcome this problem, we propose a genuine online PRTA induction approach that incorporates new instances by first collapsing…

Theoretical computer sciencebusiness.industryComputer scienceProbabilistic logiccomputer.software_genreAutomatonData setTrieAutomata theoryThe InternetData miningbusinessCluster analysiscomputer2012 IEEE 12th International Conference on Data Mining
researchProduct

LeSSS: Learned Shared Semantic Spaces for Relating Multi-Modal Representations of 3D Shapes

2015

In this paper, we propose a new method for structuring multi-modal representations of shapes according to semantic relations. We learn a metric that links semantically similar objects represented in different modalities. First, 3D-shapes are associated with textual labels by learning how textual attributes are related to the observed geometry. Correlations between similar labels are captured by simultaneously embedding labels and shape descriptors into a common latent space in which an inner product corresponds to similarity. The mapping is learned robustly by optimizing a rank-based loss function under a sparseness prior for the spectrum of the matrix of all classifiers. Second, we extend …

Theoretical computer sciencebusiness.industryComputer scienceRank (computer programming)Cognitive neuroscience of visual object recognitioncomputer.software_genreComputer Graphics and Computer-Aided DesignProduct (mathematics)Similarity (psychology)Line (geometry)Metric (mathematics)Collaborative filteringEmbeddingArtificial intelligencebusinesscomputerNatural language processingComputer Graphics Forum
researchProduct

Learning small programs with additional information

1997

This paper was inspired by [FBW 94]. An arbitrary upper bound on the size of some program for the target function suffices for the learning of some program for this function. In [FBW 94] it was discovered that if “learning” is understood as “identification in the limit,” then in some programming languages it is possible to learn a program of size not exceeding the bound, while in some other programming languages this is not possible.

Theoretical computer sciencebusiness.industryComputer sciencemedia_common.quotation_subjectInductive reasoningMachine learningcomputer.software_genreUpper and lower boundsIdentification (information)Recursive functionsArtificial intelligenceLimit (mathematics)businessFunction (engineering)computermedia_common
researchProduct

The power of procrastination in inductive inference: How it depends on used ordinal notations

1995

We consider inductive inference with procrastination. Usually it is defined using constructive ordinals. For constructive ordinals there exist many different systems of notations. In this paper we study how the power of inductive inference depends on used system of notations.

Theoretical computer sciencebusiness.industrymedia_common.quotation_subjectProcrastinationInductive reasoningMachine learningcomputer.software_genreNotationConstructivePower (physics)Mathematics::LogicArtificial intelligencebusinesscomputermedia_commonMathematics
researchProduct

An ontological-based knowledge organization for bioinformatics workflow management system

2012

Motivation and Objectives In the field of Computer Science, ontologies represent formal structures to define and organize knowledge of a specific application domain (Chandrasekaran et al., 1999). An ontology is composed of entities, called classes, and relationships among them. Classes are characterized by features, called attributes, and they can be arranged into a hierarchical organization. Ontologies are a fundamental instrument in Artificial Intelligence for the development of Knowledge-Based Systems (KBS). With its formal and well defined structure, in fact, an ontology provides a machine-understandable language that allows automatic reasoning for problems resolution. Typical KBS are E…

Theoretical computer scienceworkflow management systembusiness.industryComputer scienceIntelligent decision support systemBioinformatics workflow management systembioinformaticsOntology (information science)Solvercomputer.software_genreExpert systemWorkflowArtificial intelligenceontologybusinessCluster analysiscomputerWorkflow management system
researchProduct

Theognis of Megara and the Divine Creating Power in the Framework of Semiotic Textology: An Application of János Sándor Petöfi’s Theory to Archaic Gr…

2012

This paper is a demonstration of an application of Semiotic Textology to a limited case study. The main aspects of Semiotic Textology, the theory elaborated by Petöfi, are presented; secondly the linguistic aspects of the interpretation of lines 133-134 of the Theognis of Megara's poem, analysed in the framework of said theory, are presented. All the relevant syntactic, semantic, pragmatic information involved in text processing have been considered. Through fixed steps, it is shown that text processing is not exclusively a grammatical activity, because within a theoretical interpretation an Interpreter needs a number of contextual hypotheses, in order to understand the author's ontology. ©…

Theoretical interpretationLinguistics and LanguagePoetryInterpretation (philosophy)PhilosophyText processingTheognis of Megaracomputer.software_genreSemanticsSemiotic TextologyLinguisticsSettore L-LIN/01 - Glottologia E LinguisticaEpistemologyJános Sándor PetöfiPhilosophyText processingComputer Science (miscellaneous)OntologySemioticsGreek literaturecomputerInterpreterJournal of Logic, Language and Information
researchProduct

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct