• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 30,097
Next 10 →

Table 3 shows results for the generalization of explana- tions from contexts to situations discussed in [20]. Without going into the details here, in this scenario the epistemic state consists of a set a201 of pairs a16a57a61

in Complexity Results for Explanations in the Structural-Model Approach
by Thomas Eiter, Thomas Lukasiewicz 2002
"... In PAGE 4: ... The problem Explanation Existence is associated with the important task of finding an explanation for an event a110 . Similar as in other frameworks for explanations Table 1: Complexity of Explanations Problem general case binary case Explanation a184a35a185a186 -complete a184a35a185 -complete Explanation Existence a187 a185 a188 -complete a187 a185 a186 -complete a189 -Partial Explanation a190a42a191 a168 a104 a192 -complete a190a88a193 a185 a192 -complete a189 -Partial Explanation Existence a187 a185 a188 -complete a187 a185 a186 -complete Partial Explanation a190 a191 a168 a104 a192 -complete a190 a193 a185 a192 -complete Explanatory Power a194a72a190a42a191 a168 a104 a192 -complete a194a72a190 a193 a185 a192 -complete Table 2: Complexity of Explanations: Succinct Contexts Problem general case binary case Explanation a195 a185 a196 -complete a195 a185 a188 -complete Partial Explanation a195 a185 a196 -complete a195 a185 a188 -complete Table3 : Complexity of Explanations: Situations Problem general case binary case Explanation a184 a185 a186 -complete a184 a185 -complete (e.g.... ..."
Cited by 7

Table 2 presents a comparison between difierent proposals in the literature with regard to the kinds of uniqueness, alias encapsulation, and borrowing they pro- vide. For reasons of space, we restrict our discussion mainly to object-oriented programming languages. For a few pointers into less closely related literature, see e.g., [11, 13], or for a recent discussion on aliasing in general, see [16].

in External uniqueness is unique enough
by Dave Clarke, Tobias Wrigstad 2003
"... In PAGE 18: ... Table2 . Comparison.... In PAGE 20: ... Guava [3] also uses lent parameters to avoid capturing of objects. Some remarks regarding Table2 follow. (a) PRFJ [9] permits object graphs which violates deep ownership, but it uses an efiects system to prevent access through the ofiending references.... ..."
Cited by 52

Table 1: Order of magnitude of space and time requirements for the various general-purpose algorithms discussed here. Here c denotes a constant and the meaning of all the other symbols used is summarized in Section 3.3. Note: For the variant of BPTT(h) in which past weight values are saved, the space requirements are in (wAh).

in Gradient-Based Learning Algorithms for Recurrent Connectionist Networks
by Ronald J. Williams, David Zipser 1995
Cited by 84

Table 1: Order of magnitude of space and time requirements for the various general-purpose algorithms discussed here. Here c denotes a constant and the meaning of all the other symbols used is summarized in Section 3.3. Note: For the variant of BPTT(h) in which past weight values are saved, the space requirements are in (wAh).

in Gradient-Based Learning Algorithms for Recurrent Networks and Their Computational Complexity
by Ronald J. Williams, David Zipser
"... In PAGE 17: ... This amounts to an average of (nT wA) operations per time step. Thus the space complexity of the gradient computation for RTRL is in (nwA), and its average time complexity per time step is in (wUwA), as indicated in Table1 . When the network is fully connected and all weights are adaptable, this algorithm has space complexity in (n3) and average time complexity per time step in (n4), as shown in Table 2.... In PAGE 32: ...12 Note that BPTT(16;8) is thus well over 50 times faster than RTRL on this task. |||||||||||||||||||||||| Insert Table1 about here. |||||||||||||||||||||||| |||||||||||||||||||||||| Insert Table 2 about here.... ..."

Table 1. Dictionary generalizations.

in Learning to extract proteins and their interactions from Medline abstracts
by Razvan Bunescu, Ruifang Ge, Rohit J. Kate, Raymond J. Mooney, Yuk Wah Wong, Arun Ramani 2002
"... In PAGE 2: ... The aim was to extend the coverage of the original set, while at the same time trying to mini- mize any decrease in accuracy. Table1 shows some examples of name generalizations. We used this generalized dictionary-based tagger for supplying a pre-tagged input to some of the learning methods that will be discussed in the following sec- tions.... ..."
Cited by 7

Table 10 Tests of the Race-Model Inequality, Experiment 5

in unknown title
by unknown authors 1991
Cited by 4

Table 1.1 A summary of the results discussed in this paper. Column 2 contains previously known results for general graphs. Column 3 gives bounds on bipartite networks based on the improved bound on L. Column 4 gives our new results based on the two-edge push rule.

in Improved Algorithms For Bipartite Network Flow
by Ravindra K. Ahuja, James B. Orlin, Clifford Stein, Robert E. Tarjan

TABLE 1.1 A summary of the results discussed in this paper. Column 2 contains previously known results for general graphs. Column 3 gives bounds on bipartite networks based on the improved bound on L. Column 4 gives our new results based on the two-edge push rule.

in IMPROVED ALGORITHMS FOR BIPARTITE NETWORK FLOW
by Ravindra K. Ahuja , James B. Orlin, Clifford Stein, Robert E. Tarjan

Table 1. Derivatives and their inverses: reconstructions by integration. D is the dimension. p is the characteristic (also non-integer) power of frequency in the Derivative Transfer Function. Note that for p=0 the Generalized Vector Gradient and its Inverse are equal to the Vector Hilbert Transform and its Inverse as discussed in [4].

in The D-dimensional inverse vector-gradient operator and its application for scale free image enhancement
by Piet W. Verbeek, Judith Dijk 2001
"... In PAGE 4: ...ccording to the chain (cf. fig. 1c) {Derivative operator, Non-linear Point Processing, Inverse Derivative operator} a variety of enhancement methods can be constructed. Table1 gives a survey of the derivatives to be chosen. The integrations are up to zero-derivative terms.... ..."
Cited by 3

Table 1: Generalized Lyapunov equations

in Generalized Lyapunov Equations for Descriptor Systems: Stability and Inertia Theorems
by Tatjana Stykel 2000
"... In PAGE 20: ...82 remain valid if the matrix G is positive de nite only on the subspace im Pr. In Table1 we review the generalized continuous-time and discrete-time Lyapunov equa- tions with di erent right-hand sides discussed in this section. 3 Inertia theorems The constrained generalized Lyapunov equations can be used to generalize some inertia theorems for matrices, e.... ..."
Next 10 →
Results 11 - 20 of 30,097
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University