Sciweavers

1837 search results - page 281 / 368
» Learning From Ambiguous Examples
Sort
View
JCS
2006
91views more  JCS 2006»
15 years 4 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...
KI
2008
Springer
15 years 4 months ago
Analysis and Evaluation of Inductive Programming Systems in a Higher-Order Framework
Abstract. In this paper we present a comparison of several inductive programming (IP) systems. IP addresses the problem of learning (recursive) programs from incomplete specificati...
Martin Hofmann 0008, Emanuel Kitzelmann, Ute Schmi...
COGSCI
2002
108views more  COGSCI 2002»
15 years 4 months ago
Statistical models for the induction and use of selectional preferences
Selectional preferences have a long history in both generative and computational linguistics. However, since the publication of Resnik's dissertation in 1993, a new approach ...
Marc Light, Warren R. Greiff
ETS
2000
IEEE
98views Hardware» more  ETS 2000»
15 years 4 months ago
The Mystery Project: Bridging the Gap On-line
This paper presents a case study of a web-based on-line collaborative academic writing project by students of English as a Foreign Language (EFL) at two Higher Education instituti...
Esther J. Dunbar, Susan Linklater, David Oakey
NPL
2000
99views more  NPL 2000»
15 years 4 months ago
On the Internal Representations of Product Units
This paper explores internal representation power of product units [1] that act as the functional nodes in the hidden layer of a multi-layer feedforward network. Interesting proper...
Jung-Hua Wang, Yi-Wei Yu, Jia-Horng Tsai