Results 1  10
of
28
KnowledgeBased Artificial Neural Networks
, 1994
"... Hybrid learning methods use theoretical knowledge of a domain and a set of classified examples to develop a method for accurately classifying examples not seen during training. The challenge of hybrid learning systems is to use the information provided by one source of information to offset informat ..."
Abstract

Cited by 145 (13 self)
 Add to MetaCart
Hybrid learning methods use theoretical knowledge of a domain and a set of classified examples to develop a method for accurately classifying examples not seen during training. The challenge of hybrid learning systems is to use the information provided by one source of information to offset information missing from the other source. By so doing, a hybrid learning system should learn more effectively than systems that use only one of the information sources. KBANN(KnowledgeBased Artificial Neural Networks) is a hybrid learning system built on top of connectionist learning techniques. It maps problemspecific "domain theories", represented in propositional logic, into neural networks and then refines this reformulated knowledge using backpropagation. KBANN is evaluated by extensive empirical tests on two problems from molecular biology. Among other results, these tests show that the networks created by KBANN generalize better than a wide variety of learning systems, as well as several t...
Beyond Turing Machines
"... In this paper we describe and analyze models of problem solving and computation going beyond Turing Machines. Three principles of extending the Turing Machine's expressiveness are identified, namely, by interaction, evolution and infinity. Several models utilizing the above principles are present ..."
Abstract

Cited by 32 (4 self)
 Add to MetaCart
In this paper we describe and analyze models of problem solving and computation going beyond Turing Machines. Three principles of extending the Turing Machine's expressiveness are identified, namely, by interaction, evolution and infinity. Several models utilizing the above principles are presented. Other
The Neural Network Pushdown Automaton: Model, Stack and Learning Simulations
, 1993
"... In order for neural networks to learn complex languages or grammars, they must have sufficient computational power or resources to recognize or generate such languages. Though many approaches to effectively utilizing the computational power of neural networks have been discussed, an obvious one is t ..."
Abstract

Cited by 17 (2 self)
 Add to MetaCart
In order for neural networks to learn complex languages or grammars, they must have sufficient computational power or resources to recognize or generate such languages. Though many approaches to effectively utilizing the computational power of neural networks have been discussed, an obvious one is to couple a recurrent neural network with an external stack memory in effect creating a neural network pushdown automata (NNPDA). This NNPDA generalizes the concept of a recurrent network so that the network becomes a more complex computing structure. This paper discusses in detail a NNPDA its construction, how it can be trained and how useful symbolic information can be extracted from the trained network. To effectively couple the external stack to the neural network, an optimization method is developed which uses an error function that connects the learning of the state automaton of the neural network to the learning of the operation of the external stack: push, pop, and nooperation. To minimize the error function using gradient descent learning, an analog stack is designed such that the action and storage of information in the stack are continuous. One interpretation of a continuous stack is the probabilistic storage of and action on data. After training on sample strings of an unknown source grammar, a quantization procedure extracts from the analog stack and neural network a discrete pushdown automata (PDA). Simulations show that in learning deterministic contextfree grammars the balanced parenthesis language, 1 n 0 n, and the deterministic Palindrome the extracted PDA is correct in the sense that it can correctly recognize unseen strings of arbitrary length. In addition, the extracted PDAs can be shown to be identical or equivalent to the PDAs of the source grammars which were used to generate the training strings.
Computational Modeling vs. Computational Explanation: Is Everything a Turing Machine, and Does It Matter to the Philosophy of Mind?” Australasian
 Philosophy of Science. Piccinini, G. (forthcoming b). “Computation without Representation,” Philosophical
, 2007
"... According to pancomputationalism, everything is a computing system. In this paper, I distinguish between different varieties of pancomputationalism. I find that although some varieties are more plausible than others, only the strongest variety is relevant to the philosophy of mind, but only the most ..."
Abstract

Cited by 9 (4 self)
 Add to MetaCart
According to pancomputationalism, everything is a computing system. In this paper, I distinguish between different varieties of pancomputationalism. I find that although some varieties are more plausible than others, only the strongest variety is relevant to the philosophy of mind, but only the most trivial varieties are true. As a side effect of this exercise, I offer a clarified distinction between computational modelling and computational explanation. I. Pancomputationalism and the Computational Theory of Mind The main target of this paper is pancomputationalism, according to which everything is a computing system. I have encountered two peculiar responses to pancomputationalism: some philosophers find it obviously false, too silly to be worth refuting; others find it obviously true, too trivial to require a defence. Neither camp sees the need for this paper. But neither camp seems aware of the other camp. The existence of both camps, together with continuing appeals to pancomputationalism in the literature, compel me to analyse the matter more closely. In this paper, I distinguish between different varieties of pancomputationalism. I find that although some are more plausible than others, only the strongest variety is relevant to the philosophy of mind, but only the most trivial varieties are true. As a side effect of this exercise, I offer a clarified distinction between computational modelling and computational explanation. The canonical formulation of pancomputationalism is due to Hilary Putnam: ‘everything is a Probabilistic Automaton under some Description’ [Putnam 1999: 31; ‘probabilistic automaton ’ is Putnam’s term for
Learning to See Analogies: a Connectionist Exploration, Appendix A: Resources
, 1997
"... This is Appendix A to the thesis " Learning to See Analogies: a Connectionist Exploration." ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
This is Appendix A to the thesis " Learning to See Analogies: a Connectionist Exploration."
Mobile Robot Local Navigation with a Polar Neural Map
, 1998
"... B Biographical Sketch .................................135 viii List of Tables Table 1 Algorithm for path construction. .......................41 Table 2 Algorithm for determining the next movement direction. . . . . ....41 Table 3 Computational complexity of the system. . . ...............99 ..."
Abstract

Cited by 4 (3 self)
 Add to MetaCart
B Biographical Sketch .................................135 viii List of Tables Table 1 Algorithm for path construction. .......................41 Table 2 Algorithm for determining the next movement direction. . . . . ....41 Table 3 Computational complexity of the system. . . ...............99 ix List of Figures Figure 1 Several mobile robots of the class we consider in the thesis. .... 9 Figure 2 The concept of a neural map. . .......................20 Figure 3 Selforganization at the neural mapping (9) level. More neurons are assigned to the `important' areas of X. The mapping is shown by superimposing the neural field F on the signal space X. . . . . . 24 Figure 4 The basic nonlinear processing unit or neuron. . . ...........25 Figure 5 The architecture of the subsystem for path planning with neural maps. ...................................... 31 Figure 6 Different network topologies and connections for 2dimensional uniform coverage. . ..............................32 Figure 7 Connection weight as a function of distance. . . . ...........33 Figure 8 The nonlinear activation function. . . . ...................35 Figure 9 The target and obstacle configurations (left) and the contours of the equilibrium surface (right). . . . . ...................38 Figure 10 Network equilibrium state of a 50 50 neural map for a single target. ......................................39 Figure 11 The target and obstacle configurations (left) and the contours of the equilibrium surface (right). . . . . ...................39 Figure 12 Network equilibrium state of a 50 50 neural map for multiple targets. ......................................40 Figure 13 Update rasters on a 2dimensional lattice. . ...............46 Fi...
2012 “From dissonance to resonance: Cognitive interdependence in quantitative finance
 Economy and Society
"... This study explores the elusive social dimension of quantitative finance. We conducted three years of observations in the derivatives trading room of a major investment bank. We found that traders use models to translate stock prices into estimates of what their rivals think. Traders use these estim ..."
Abstract

Cited by 4 (1 self)
 Add to MetaCart
This study explores the elusive social dimension of quantitative finance. We conducted three years of observations in the derivatives trading room of a major investment bank. We found that traders use models to translate stock prices into estimates of what their rivals think. Traders use these estimates to look out for possible errors in their own models. We found that this practice, reflexive modeling, enhances returns by turning prices into a vehicle for distributed cognition. But it also induces a dangerous form of cognitive interdependence: when enough traders overlook a key issue, their positions give misplaced reassurance to those traders that think similarly, disrupting their reflexive processes. In cases lacking diversity, dissonance thus gives way to resonance. Our analysis demonstrates how practices born in caution can lead to overconfidence and collective failure. We contribute to economic sociology by developing a sociotechnical account that grapples with the new forms of sociality introduced by financial models – dissembedded yet entangled; anonymous yet collective; impersonal yet, nevertheless, emphatically social.
Outlier management in intelligent data analysis
, 2000
"... In spite of many statistical methods for outlier detection and for robust analysis, there is little work on further analysis of outliers themselves to determine their origins. For example, there are “good ” outliers that provide useful information that can lead to the discovery of new knowledge, or ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
In spite of many statistical methods for outlier detection and for robust analysis, there is little work on further analysis of outliers themselves to determine their origins. For example, there are “good ” outliers that provide useful information that can lead to the discovery of new knowledge, or “bad ” outliers that include noisy data points. Successfully distinguishing between different types of outliers is an important issue in many applications, including fraud detection, medical tests, process analysis and scientific discovery. It requires not only an understanding of the mathematical properties of data but also relevant knowledge in the domain context in which the outliers occur. This thesis presents a novel attempt in automating the use of domain knowledge in helping distinguish between different types of outliers. Two complementary knowledgebased outlier analysis strategies are proposed: one using knowledge regarding how “normal data ” should be distributed in a domain of interest in order to identify “good ” outliers, and the other using the understanding of “bad ” outliers. This kind of knowledgebased outlier analysis is a useful extension to existing work in both statistical and computing communities on outlier detection.
Learning Geometric Transformations with Clifford Neurons
, 2000
"... In this paper we propose a new type of neuron developed in the framework of Clifford algebra. It is shown how this novel Clifford neuron covers complex and quaternionic neurons and that it can compute orthogonal transformations very efficiently. The introduced framework can also be used for neural c ..."
Abstract

Cited by 2 (2 self)
 Add to MetaCart
In this paper we propose a new type of neuron developed in the framework of Clifford algebra. It is shown how this novel Clifford neuron covers complex and quaternionic neurons and that it can compute orthogonal transformations very efficiently. The introduced framework can also be used for neural computation of nonlinear geometric transformations which makes it very promising for applications. As an example we develop a Clifford neuron that computes the crossratio via the corresponding Möbius transformation. Experimental results for the proposed novel neural models are reported.
Signed Digit Addition and Related Operations with Threshold Logic
, 2000
"... Assuming signed digit number representations we investigate the implementation of some addition related operations assuming linear threshold networks. We measure the depth and size of the networks in terms of linear threshold gates. We show first that a depth2 network with O(n) size, weight and fan ..."
Abstract

Cited by 2 (1 self)
 Add to MetaCart
Assuming signed digit number representations we investigate the implementation of some addition related operations assuming linear threshold networks. We measure the depth and size of the networks in terms of linear threshold gates. We show first that a depth2 network with O(n) size, weight and fanin complexities can perform signed digit symmetric functions. Consequently, assuming radix2 signed digit representation, we show that the two operand addition can be performed by a threshold network of depth2 having O(n) size complexity and O(1) weight and fanin complexities. Furthermore we show that assuming radix(2n \Gamma 1) signed digit representations we show that the multioperand addition can be computed by a depth2 network with O(n³) size with the weight and fanin complexities being polynomially bounded. Finally, we show that multiplication can be performed by a linear threshold network of depth3 with the size of O(n³) requiring O(n³) weights and O(n² log n) fa...