Sciweavers

1101 search results - page 147 / 221
» Forcing in proof theory
Sort
View
92
Voted
IJCAI
1989
15 years 1 months ago
Using and Refining Simplifications: Explanation-Based Learning of Plans in Intractable Domains
This paper describes an explanation-based approach lo learning plans despite a computationally intractable domain theory. In this approach, the system learns an initial plan using...
Steve A. Chien
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
108
Voted
GECCO
2008
Springer
109views Optimization» more  GECCO 2008»
15 years 1 months ago
Focused no free lunch theorems
Proofs and empirical evidence are presented which show that a subset of algorithms can have identical performance over a subset of functions, even when the subset of functions is ...
Darrell Whitley, Jonathan E. Rowe
112
Voted
ICASSP
2010
IEEE
15 years 24 days ago
A nullspace analysis of the nuclear norm heuristic for rank minimization
The problem of minimizing the rank of a matrix subject to linear equality constraints arises in applications in machine learning, dimensionality reduction, and control theory, and...
Krishnamurthy Dvijotham, Maryam Fazel
93
Voted
AML
2008
47views more  AML 2008»
15 years 22 days ago
Fruitful and helpful ordinal functions
This document is a survey of the four papers [H], [Sch], [Com], [FandH]. It gives the relevant background and shows how the papers fit together to form a whole. Material from thos...
Harold Simmons