Search results for "formal"

showing 10 items of 1654 documents

Equivalence closure in the two-variable guarded fragment

2015

We consider the satisfiability and finite satisfiability problems for the extension of the two-variable guarded fragment in which an equivalence closure operator can be applied to two distinguished binary predicates. We show that the satisfiability and finite satisfiability problems for this logic are 2-ExpTime-complete. This contrasts with an earlier result that the corresponding problems for the full two-variable logic with equivalence closures of two binary predicates are 2-NExpTime-complete.

Computational complexity theoryLogiccomputational complexityguarded fragmentsatisfiability problemBinary numberTheoretical Computer ScienceCombinatoricsArts and Humanities (miscellaneous)Computer Science::Logic in Computer ScienceClosure operatorEquivalence (formal languages)MathematicsDiscrete mathematicssatisfiability problemcomputational complexitydecidabilityequivalence closureSatisfiabilityDecidabilityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESClosure (computer programming)Hardware and ArchitectureTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSBoolean satisfiability problemSoftwareJournal of Logic and Computation
researchProduct

Los Estereotipos de género en las producciones audiovisuales: diseño y validación de la tabla de análisis EG_5x4

2022

Los productos culturales de la educación no formal, y en concreto los difundidos por televisión y plataformas streaming, incluidas no ficción y animación infantil, proponen entre sus figuraciones personajes estereotipados en su construcción de género. Según investigaciones previas, identificarlos y combatirlos favorece la erradicación de ideas sexistas relacionadas con violencias machistas. Por ello, el objetivo que se planteó fue diseñar y validar una tabla de análisis de estereotipos sexuales presentes en cualquier producto audiovisual. El proceso siguió un protocolo de 3 fases (Garrido et al., 2015): 1) Se revisó la literatura publicada, se extrajeron rasgos relacionados con estereotipos…

Computer Networks and CommunicationsInstrumentos de MediciónCoeducationCoeducaciónMeasuring InstrumentsComputer Science ApplicationsEducationEstereotipos de GéneroEducación No FormalCiència EnsenyamentEducació socialNonformal EducationGender StereotypesAdolescents Conducta sexualInformation Systems
researchProduct

Learning by the Process of Elimination

2002

AbstractElimination of potential hypotheses is a fundamental component of many learning processes. In order to understand the nature of elimination, herein we study the following model of learning recursive functions from examples. On any target function, the learning machine has to eliminate all, save one, possible hypotheses such that the missing one correctly describes the target function. It turns out that this type of learning by the process of elimination (elm-learning, for short) can be stronger, weaker or of the same power as usual Gold style learning.While for usual learning any r.e. class of recursive functions can be learned in all of its numberings, this is no longer true for el…

Computer Science::Machine LearningProcess of eliminationGeneralization0102 computer and information sciences02 engineering and technology01 natural sciencesNumberingComputer Science ApplicationsTheoretical Computer ScienceDecidabilityAlgebraComputational Theory and Mathematics010201 computation theory & mathematicsPhysics::Plasma Physics0202 electrical engineering electronic engineering information engineeringRecursive functions020201 artificial intelligence & image processingEquivalence (formal languages)Information SystemsMathematicsInformation and Computation
researchProduct

A Fast Algorithm Finding the Shortest Reset Words

2013

In this paper we present a new fast algorithm for finding minimal reset words for finite synchronizing automata, which is a problem appearing in many practical applications. The problem is known to be computationally hard, so our algorithm is exponential in the worst case, but it is faster than the algorithms used so far and it performs well on average. The main idea is to use a bidirectional BFS and radix (Patricia) tries to store and compare subsets. Also a number of heuristics are applied. We give both theoretical and practical arguments showing that the effective branching factor is considerably reduced. As a practical test we perform an experimental study of the length of the shortest …

Computer scienceBranching factorSynchronizing wordApproxHeuristicsReset (computing)AlgorithmComputer Science::Formal Languages and Automata TheoryWord (computer architecture)AutomatonExponential function
researchProduct

Integer Weighted Regression Tsetlin Machines

2020

The Regression Tsetlin Machine (RTM) addresses the lack of interpretability impeding state-of-the-art nonlinear regression models. It does this by using conjunctive clauses in propositional logic to capture the underlying non-linear frequent patterns in the data. These, in turn, are combined into a continuous output through summation, akin to a linear regression function, however, with non-linear components and binary weights. However, the resolution of the RTM output is proportional to the number of clauses employed. This means that computation cost increases with resolution. To address this problem, we here introduce integer weighted RTM clauses. Our integer weighted clause is a compact r…

Computer scienceComputationBinary numberResolution (logic)Representation (mathematics)Nonlinear regressionUnit-weighted regressionAlgorithmComputer Science::Formal Languages and Automata TheoryInteger (computer science)Interpretability
researchProduct

Automatic Calibration of an Industrial RGB-D Camera Network Using Retroreflective Fiducial Markers

2019

This paper describes a non-invasive, automatic, and robust method for calibrating a scalable RGB-D sensor network based on retroreflective ArUco markers and the iterative closest point (ICP) scheme. We demonstrate the system by calibrating a sensor network comprised of six sensor nodes positioned in a relatively large industrial robot cell with an approximate size of 10 m × 10 m × 4 m . Here, the automatic calibration achieved an average Euclidean error of 3 c m at distances up to 9.45 m . To achieve robustness, we apply several innovative techniques: Firstly, we mitigate the ambiguity problem that occurs when detecting a marker at long range or low resolution by comparing the…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologylcsh:Chemical technologytime-of-flightBiochemistryArticleVDP::Food science and technology: 600Analytical Chemistrylaw.inventionIndustrial robotlawRegion of interestRobustness (computer science)automatic calibration0202 electrical engineering electronic engineering information engineeringCalibrationVDP::Næringsmiddelteknologi: 600lcsh:TP1-1185Computer visionElectrical and Electronic EngineeringInstrumentationbusiness.industryambiguity problemIterative closest point3D sensors020207 software engineeringretroreflective markersAtomic and Molecular Physics and OpticsTime of flightTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRGB color model020201 artificial intelligence & image processingArtificial intelligencebusinessFiducial markerWireless sensor networkSensors
researchProduct

Of Many, Many Other Things

2021

Propositions of everyday discourse can have, unlike those of formal languages, other components over and above the predicate and the terms needed to saturate it. These components are of two very different sorts: adverbs and further individual terms. Only adverbs have already been discussed by other writers in this connection; but they are not the whole story.

Computer scienceFormal languagePredicate (mathematical logic)LinguisticsConnection (mathematics)
researchProduct

On Contextuality in Behavioral Data

2015

Dzhafarov, Zhang, and Kujala (Phil. Trans. Roy. Soc. A 374, 20150099) reviewed several behavioral data sets imitating the formal design of the quantum-mechanical contextuality experiments. The conclusion was that none of these data sets exhibited contextuality if understood in the generalized sense proposed in Dzhafarov, Kujala, and Larsson (Found. Phys. 7, 762-782, 2015), while the traditional definition of contextuality does not apply to these data because they violate the condition of consistent connectedness (also known as marginal selectivity, no-signaling condition, no-disturbance principle, etc.). In this paper we clarify the relationship between (in)consistent connectedness and (non…

Computer scienceGeneral MathematicsFOS: Physical sciencesGeneral Physics and Astronomy01 natural sciences050105 experimental psychology0103 physical sciences0501 psychology and cognitive sciencescontextuality010306 general physicsta515Cognitive scienceQuantum Physics05 social sciencesta111General Engineeringcyclic systemsArticlesKochen–Specker theorem81P13 81Q99 60A99 81P13 81Q99 60A99 81P13 81Q99 60A99Formal designFOS: Biological sciencesQuantitative Biology - Neurons and Cognitionconsistent connectednessNeurons and Cognition (q-bio.NC)Quantum Physics (quant-ph)
researchProduct

Transformations that preserve learnability

1996

We consider transformations (performed by general recursive operators) mapping recursive functions into recursive functions. These transformations can be considered as mapping sets of recursive functions into sets of recursive functions. A transformation is said to be preserving the identification type I, if the transformation always maps I-identifiable sets into I-identifiable sets.

Computer scienceLearnabilityType (model theory)Inductive reasoningAlgebraTuring machinesymbols.namesakeIdentification (information)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESTransformation (function)TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSRecursive functionssymbolsInitial segment
researchProduct

Design, Control, and Analysis of Nonlinear Circuits with Tunnel Diode with Piecewise Affine Dynamics

2019

Computer scienceMechanical EngineeringDynamics (mechanics)Nonlinear circuitsEnergy Engineering and Power TechnologyDesign controlIndustrial and Manufacturing EngineeringNonlinear systemControl theoryLimit cycleAutomotive EngineeringTunnel diodePiecewise affineElectrical and Electronic EngineeringFormal verificationIEEJ Journal of Industry Applications
researchProduct