Sciweavers

2263 search results - page 402 / 453
» The Use of Functional and Logic Languages in Machine Learnin...
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
AI
1998
Springer
13 years 8 months ago
What Robots Can Do: Robot Programs and Effective Achievability
In this paper, we propose a definition of goal achievability: given a basic action theory describing an initial state of the world and some primitive actions available to a robot...
Fangzhen Lin, Hector J. Levesque
TASLP
2002
143views more  TASLP 2002»
13 years 8 months ago
Creating conversational interfaces for children
Creating conversational interfaces for children is challenging in several respects. These include acoustic modeling for automatic speech recognition (ASR), language and dialog mode...
Shrikanth S. Narayanan, Alexandros Potamianos
INFORMS
1998
100views more  INFORMS 1998»
13 years 8 months ago
Feature Selection via Mathematical Programming
The problem of discriminating between two nite point sets in n-dimensional feature space by a separating plane that utilizes as few of the features as possible, is formulated as a...
Paul S. Bradley, Olvi L. Mangasarian, W. Nick Stre...
COLT
1995
Springer
14 years 8 days ago
Regression NSS: An Alternative to Cross Validation
The Noise Sensitivity Signature (NSS), originally introduced by Grossman and Lapedes (1993), was proposed as an alternative to cross validation for selecting network complexity. I...
Michael P. Perrone, Brian S. Blais