Sciweavers

71 search results - page 3 / 15
» A Semantic Foundation for Hidden State
Sort
View
TOPLAS
2010
93views more  TOPLAS 2010»
13 years 5 months ago
Semantics of fractional permissions with nesting
Fractional permissions use fractions to distinguish write access (1) from read access (any smaller fraction). Nesting (an extension of adoption) can be used to model object invari...
John Tang Boyland
SIGCSE
2009
ACM
137views Education» more  SIGCSE 2009»
14 years 8 months ago
The hidden injuries of overloading 'ADT'
commonly stated definition of abstract data type (ADT) is that it is a domain of values and the operations over that domain. So, for example, a language's built-in types, lik...
Duane Buck, David J. Stucki
GFKL
2007
Springer
184views Data Mining» more  GFKL 2007»
14 years 1 months ago
A Probabilistic Relational Model for Characterizing Situations in Dynamic Multi-Agent Systems
Abstract. Artificial systems with a high degree of autonomy require reliable semantic information about the context they operate in. State interpretation, however, is a difficult ...
Daniel Meyer-Delius, Christian Plagemann, Georg vo...
SSPR
2004
Springer
14 years 24 days ago
Tracking the Evolution of a Tennis Match Using Hidden Markov Models
The creation of a cognitive perception systems capable of inferring higher-level semantic information from low-level feature and event information for a given type of multimedia co...
Ilias Kolonias, William J. Christmas, Josef Kittle...
NIPS
2004
13 years 8 months ago
Schema Learning: Experience-Based Construction of Predictive Action Models
Schema learning is a way to discover probabilistic, constructivist, predictive action models (schemas) from experience. It includes methods for finding and using hidden state to m...
Michael P. Holmes, Charles Lee Isbell Jr.