Sciweavers

2907 search results - page 13 / 582
» Presentations of Structures in Admissible Sets
Sort
View
IJCAI
2007
13 years 10 months ago
A Labeling Approach to the Computation of Credulous Acceptance in Argumentation
In recent years, the combinatorics of argumentation with arguments that can attack each other has been studied extensively. Especially, attack graphs (put in the focus of attentio...
Bart Verheij
INFORMATICALT
2002
82views more  INFORMATICALT 2002»
13 years 8 months ago
Data Aggregation Sets in Adaptive Data Model
This article presents the ways of identification, selection and transformation of the data into other structures. Relation selection and transformation may change data quantity and...
Petras Gailutis Adomenas, Algirdas Ciucelis
CDC
2010
IEEE
129views Control Systems» more  CDC 2010»
13 years 3 months ago
On parameterized Lyapunov and control Lyapunov functions for discrete-time systems
This paper deals with the existence and synthesis of parameterized-(control) Lyapunov functions (p-(C)LFs) for discrete-time nonlinear systems that are possibly subject to constrai...
Mircea Lazar, Rob H. Gielen
IJCNN
2006
IEEE
14 years 2 months ago
Sparse Optimization for Second Order Kernel Methods
— We present a new optimization procedure which is particularly suited for the solution of second-order kernel methods like e.g. Kernel-PCA. Common to these methods is that there...
Roland Vollgraf, Klaus Obermayer
ACL
1998
13 years 9 months ago
Automated Scoring Using A Hybrid Feature Identification Technique
This study exploits statistical redundancy inherent in natural language to automatically predict scores for essays. We use a hybrid feature identification method, including syntac...
Jill Burstein, Karen Kukich, Susanne Wolff, Chi Lu...