Sciweavers

3318 search results - page 124 / 664
» The Weak Instance Model
Sort
View
POPL
2008
ACM
14 years 8 months ago
The intensional content of Rice's theorem
The proofs of major results of Computability Theory like Rice, Rice-Shapiro or Kleene's fixed point theorem hide more information of what is usually expressed in their respec...
Andrea Asperti
WCRE
2008
IEEE
14 years 2 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
PKDD
2007
Springer
143views Data Mining» more  PKDD 2007»
14 years 2 months ago
Using the Web to Reduce Data Sparseness in Pattern-Based Information Extraction
Textual patterns have been used effectively to extract information from large text collections. However they rely heavily on textual redundancy in the sense that facts have to be m...
Sebastian Blohm, Philipp Cimiano
AAAI
2007
13 years 10 months ago
Domain-Independent Construction of Pattern Database Heuristics for Cost-Optimal Planning
Heuristic search is a leading approach to domain-independent planning. For cost-optimal planning, however, existing admissible heuristics are generally too weak to effectively gui...
Patrik Haslum, Adi Botea, Malte Helmert, Blai Bone...
EUSFLAT
2007
132views Fuzzy Logic» more  EUSFLAT 2007»
13 years 9 months ago
Shortfall-dependant Risk Measures (and Previsions)
Because of their simplicity, risk measures are often employed in financial risk evaluations and related decisions. In fact, the risk measure ρ(X) of a random variable X is a rea...
Pietro Baroni, Renato Pelessoni, Paolo Vicig