Sciweavers

347 search results - page 35 / 70
» Some Second Order Set Theory
Sort
View
72
Voted
MCS
2010
Springer
14 years 8 months ago
MinT - Architecture and applications of the (t, m, s)-net and OOA database
Many different constructions for (t, m, s)-nets and (t, s)-sequences are known today. Propagation rules as well as connections to other mathematical objects make it difficult to ...
Rudolf Schürer, Wolfgang Ch. Schmid
POPL
2009
ACM
15 years 10 months ago
Relaxed memory models: an operational approach
Memory models define an interface between programs written in some language and their implementation, determining which behaviour the memory (and thus a program) is allowed to hav...
Gérard Boudol, Gustavo Petri
80
Voted
ICDM
2006
IEEE
182views Data Mining» more  ICDM 2006»
15 years 3 months ago
Active Learning to Maximize Area Under the ROC Curve
In active learning, a machine learning algorithm is given an unlabeled set of examples U, and is allowed to request labels for a relatively small subset of U to use for training. ...
Matt Culver, Kun Deng, Stephen D. Scott
66
Voted
IROS
2006
IEEE
100views Robotics» more  IROS 2006»
15 years 3 months ago
Towards Whole Arm Manipulation by Contact State Transition
— This paper discusses the whole arm manipulation allowing the contact state transition. For manipulation of an object under fully constrained, the contact state transition becom...
Tetsuyou Watanabe, Kensuke Harada, Tsuneo Yoshikaw...
APPROX
2005
Springer
90views Algorithms» more  APPROX 2005»
15 years 3 months ago
Tight Bounds for String Reconstruction Using Substring Queries
We resolve two open problems presented in [8]. First, we consider the problem of reconstructing an unknown string T over a fixed alphabet using queries of the form “does the st...
Dekel Tsur