Sciweavers

663 search results - page 33 / 133
» On the Foundations of Expected Expected Utility
Sort
View
82
Voted
ICTIR
2009
Springer
15 years 4 months ago
Robust Word Similarity Estimation Using Perturbation Kernels
We introduce perturbation kernels, a new class of similarity measure for information retrieval that casts word similarity in terms of multi-task learning. Perturbation kernels mode...
Kevyn Collins-Thompson
PODC
1995
ACM
15 years 1 months ago
Issues in Distributed Control for ATM Networks
Asynchronous Transfer Mode (ATM) network technology is expected to become a central part of the emerging global information infrastructure. ATM networks introduce a number of feat...
Jonathan S. Turner
96
Voted
AAAI
2007
14 years 12 months ago
Macroscopic Models of Clique Tree Growth for Bayesian Networks
In clique tree clustering, inference consists of propagation in a clique tree compiled from a Bayesian network. In this paper, we develop an analytical approach to characterizing ...
Ole J. Mengshoel
AAAI
2007
14 years 12 months ago
An Experimental Comparison of Constraint Logic Programming and Answer Set Programming
Answer Set Programming (ASP) and Constraint Logic Programming over finite domains (CLP(FD)) are two declarative programming paradigms that have been extensively used to encode ap...
Agostino Dovier, Andrea Formisano, Enrico Pontelli
86
Voted
IWFM
1998
125views Formal Methods» more  IWFM 1998»
14 years 11 months ago
Mathematics for Formal Methods, a Proposal for Education Reform
It is widely recognized that there is a body of mathematics which is crucial to the underpinning of computer science, software engineering, and information and communications tech...
Mícheál Mac an Airchinnigh