Abstract. The hiding of internal invariants creates a mismatch between procedure specifications in an interface and proof obligations on the implementations of those procedures. T...
The cost of maintaining a given level of activity in a neuronal network depends on its size and degree of connectivity. Should a neural function require large-size fully-connected ...
This paper argues that there is no reason to distinguish between lexical information and real-world information on the basis of the formalisms used; that both types of knowledge c...
Abstract. In this paper, we mainly explore the effectiveness of two kernelbased methods, the convolution tree kernel and the shortest path dependency kernel, for Chinese relation e...
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...