Sciweavers

3318 search results - page 124 / 664
» The Weak Instance Model
Sort
View
202
Voted
POPL
2008
ACM
16 years 3 months ago
The intensional content of Rice's theorem
The proofs of major results of Computability Theory like Rice, Rice-Shapiro or Kleene's fixed point theorem hide more information of what is usually expressed in their respec...
Andrea Asperti
140
Voted
WCRE
2008
IEEE
15 years 9 months ago
Reverse Engineering CAPTCHAs
CAPTCHAs are automated Turing tests used to determine if the end-user is human and not an automated program. Users are asked to read and answer Visual CAPTCHAs, which often appear...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
124
Voted
PKDD
2007
Springer
143views Data Mining» more  PKDD 2007»
15 years 9 months ago
Using the Web to Reduce Data Sparseness in Pattern-Based Information Extraction
Textual patterns have been used effectively to extract information from large text collections. However they rely heavily on textual redundancy in the sense that facts have to be m...
Sebastian Blohm, Philipp Cimiano
112
Voted
AAAI
2007
15 years 5 months ago
Domain-Independent Construction of Pattern Database Heuristics for Cost-Optimal Planning
Heuristic search is a leading approach to domain-independent planning. For cost-optimal planning, however, existing admissible heuristics are generally too weak to effectively gui...
Patrik Haslum, Adi Botea, Malte Helmert, Blai Bone...
101
Voted
EUSFLAT
2007
132views Fuzzy Logic» more  EUSFLAT 2007»
15 years 4 months ago
Shortfall-dependant Risk Measures (and Previsions)
Because of their simplicity, risk measures are often employed in financial risk evaluations and related decisions. In fact, the risk measure ρ(X) of a random variable X is a rea...
Pietro Baroni, Renato Pelessoni, Paolo Vicig