Sciweavers

5122 search results - page 190 / 1025
» Comparing Consequence Relations
Sort
View
133
Voted
FOCS
1999
IEEE
15 years 8 months ago
An Algorithmic Theory of Learning: Robust Concepts and Random Projection
We study the phenomenon of cognitive learning from an algorithmic standpoint. How does the brain effectively learn concepts from a small number of examples despite the fact that e...
Rosa I. Arriaga, Santosh Vempala
138
Voted
ISCAS
1999
IEEE
121views Hardware» more  ISCAS 1999»
15 years 8 months ago
The linear time-varying approach applied to a first-order dynamic translinear filter
Dynamic translinear (DTL) circuits use the exponential inputoutput relation of the transistor as a primitive for the synthesis of electronic circuits. As a consequence the analysi...
F. C. M. Kuijstermans, F. M. Diepstraten, Wouter A...
140
Voted
REX
1990
15 years 7 months ago
Object-Oriented Programming Versus Abstract Data Types
Data Types William R. Cook Hewlett-Packard Laboratories 1501 Page Mill Road, Palo Alto, CA, 94303-0969, USA Abstract: This tutorial collects and elaborates arguments for distinguis...
William R. Cook
125
Voted
GI
2007
Springer
15 years 7 months ago
What is Ubiquitous about Ubiquitous Computing? - Space, Technology, Surveillance, and Behaviour
: Discussing ubiquitous computing, the role of space is not quite clear. To get an understanding of the thinking on space, the main concepts of absolute, relational, and social spa...
Martin Klamt
126
Voted
CCS
2006
ACM
15 years 7 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen